SlideShare ist ein Scribd-Unternehmen logo
1 von 129
Downloaden Sie, um offline zu lesen
PROJECT TENDERING AND TRACKING APPLICATION
PROJECT TYPE: IDP
A PROJECT REPORT
Submitted by:
DEVANG MISTRY [110410107063]
KRUNAL PATEL [110410107004]
ACHAL PATEL [110410107016]
NAME OF THE INDUSTRY: MGVCL
Guided by:
Industry Guide: Internal Guide:
C N Pendor Barkha M Joshi
Superintending Engineer, MGVCL Assistant Professor, SVIT
In fulfillment for the award of the degree
of
BACHELOR OF ENGINEERING
in
COMPUTER ENGINEERING
SARDAR VALLABHBHAI PATEL INSTITUTE OF TECHNOLOGY,
VASAD
Gujarat Technological University, Ahmedabad
May, 2015
SARDAR VALLABHBHAI PATEL INSTITUTE OF TECHNOLOGY,
VASAD
Computer Engineering
2015
CERTIFICATE
Date:
This is to certify that the project entitled “Project Tendering And Tracking
Application” has been carried out by Krunal Patel (110410107004) , Devang
Mistry(110410107063) and Achal Patel(110410107016) under my guidance in
fulfillment of the degree of Bachelor of Engineering in Department of
Computer Engineering (8th
Semester) of Gujarat Technological University,
Ahmedabad during the academic year 2014-15.
Internal Guide: Head of Department:
Prof. Barkha M Joshi Prof. Bijal J.Talati
Assistant Professor, Head of the Department,
C.E. Department C.E. Department
S.V.I.T., Vasad S.V.I.T., Vasad
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
GUJARAT TECHNOLOGICAL UNIVERSITY
CERTIFICATE FOR COMPLETION OF ALL ACTIVITIES AT ONLINE PROJECT PORTAL
B.E. SEMESTER VIII, ACADEMIC YEAR 2014-2015
Date of certificate generation : 20 May 2015 (13:17)
Plagiarism Search Report
Final Project Report
Patent Drafting Exercise (PDE)
Business Model Canvas (Report)
Business Model Canvas (Image)
Submitted Four Periodic Progress Reports (PPR)
Uploaded
Uploaded
Completed
Uploaded
Uploaded
Completed
This is to certify that, Achal Ghanshyambhai Patel (Enrolment
Number-110410107016) working on project entitled with Project
Tendering And Tracking System from Computer Engineering
department of Sardar Vallabhbhai Patel Institute Of
Technology, Vasad had submitted following details at online
project portal.
Name of Student :
Signature of Student :
Achal Ghanshyambhai Patel
*Signature of Guide :
Name of Guide : Ms. Barkha Malay Joshi
This is a computer generated copy and does not indicate that your data has been evaluated. This is the receipt
that GTU has received a copy of the data that you have uploaded and submitted as your project work.
Disclaimer :
*Guide has to sign the certificate, Only if all above activities has been Completed / Uploaded.
GUJARAT TECHNOLOGICAL UNIVERSITY
CERTIFICATE FOR COMPLETION OF ALL ACTIVITIES AT ONLINE PROJECT PORTAL
B.E. SEMESTER VIII, ACADEMIC YEAR 2014-2015
Date of certificate generation : 21 May 2015 ( 0:03)
Plagiarism Search Report
Final Project Report
Patent Drafting Exercise (PDE)
Business Model Canvas (Report)
Business Model Canvas (Image)
Submitted Four Periodic Progress Reports (PPR)
Uploaded
Uploaded
Completed
Uploaded
Uploaded
Completed
This is to certify that, Devang Devendrakumar Mistry
(Enrolment Number-110410107063) working on project entitled
with Project Tendering And Tracking System from Computer
Engineering department of Sardar Vallabhbhai Patel Institute
Of Technology, Vasad had submitted following details at online
project portal.
Name of Student :
Signature of Student :
Devang Devendrakumar Mistry
*Signature of Guide :
Name of Guide : Ms. Barkha Malay Joshi
This is a computer generated copy and does not indicate that your data has been evaluated. This is the receipt
that GTU has received a copy of the data that you have uploaded and submitted as your project work.
Disclaimer :
*Guide has to sign the certificate, Only if all above activities has been Completed / Uploaded.
GUJARAT TECHNOLOGICAL UNIVERSITY
CERTIFICATE FOR COMPLETION OF ALL ACTIVITIES AT ONLINE PROJECT PORTAL
B.E. SEMESTER VIII, ACADEMIC YEAR 2014-2015
Date of certificate generation : 20 May 2015 (23:47)
Plagiarism Search Report
Final Project Report
Patent Drafting Exercise (PDE)
Business Model Canvas (Report)
Business Model Canvas (Image)
Submitted Four Periodic Progress Reports (PPR)
Uploaded
Uploaded
Completed
Uploaded
Uploaded
Completed
This is to certify that, Krunal Ashwinkumar Patel (Enrolment
Number-110410107004) working on project entitled with Project
Tendering And Tracking System from Computer Engineering
department of Sardar Vallabhbhai Patel Institute Of
Technology, Vasad had submitted following details at online
project portal.
Name of Student :
Signature of Student :
Krunal Ashwinkumar Patel
*Signature of Guide :
Name of Guide : Ms. Barkha Malay Joshi
This is a computer generated copy and does not indicate that your data has been evaluated. This is the receipt
that GTU has received a copy of the data that you have uploaded and submitted as your project work.
Disclaimer :
*Guide has to sign the certificate, Only if all above activities has been Completed / Uploaded.
PLAGIARISM REPORT/CERTIFICATE
www.plagiarism-detect.com
Date: 20.5.2015
Words: 10470
Plagiarised sources: 147
Plagiarised: 3%
http://en.wikipedia.org/wiki/Feasibility_study
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
2. their applicability to the expected needs of the proposed
3. Typically this means estimating how long the system will
4. to develop, and if it can be completed
5. a given time period using some methods like payback
http://www.slideshare.net/MRIGANKAMANDAL/feasibility-report-29350738
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
2. their applicability to the expected needs of the proposed
3. Typically this means estimating how long the system will
4. to develop, and if it can be completed
5. a given time period using some methods like payback
http://www.academia.edu/8021930/Any_Housing_Scheme_Undertaken_without_Feasibility_Studies_Cannot_suc
ceed_Preparation_for_economic
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
2. their applicability to the expected needs of the proposed
3. Typically this means estimating how long the system will
4. to develop, and if it can be completed
5. a given time period using some methods like payback
http://www.essay.uk.com/free-essays/information-technology/smile-farm-e-revolution-farmers.php
plagiarised from source: >1%
1. manipulate information then system get re-configure and user get configuration
2. requires regular maintenance so it won’t
3. failure and we can prevent data
4. When a team member knows that he will be unable to
http://www.slideshare.net/emperorofghostkumar12/computer-application-project-on
plagiarised from source: >1%
1. approach to be followed based on the internal and external
2. Some situations where the use of Waterfall model is most appropriate are
3. are very well documented, clear and fixed. Product definition is stable. Technology
4. implementation, testing, installation, troubleshooting, and ends up at operation and
http://tutsdaddy.com/what-is-android.html
plagiarised from source: >1%
1. swiping, tapping, pinching and reverse pinching to manipulate on-screen
2. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
3. customize their home screens with shortcuts to applications and widgets
4. allow users to display live content, such as emails and
http://www.slideshare.net/sureshca505/sdlc-tutorial
plagiarised from source: >1%
1. approach to be followed based on the internal and external
2. Some situations where the use of Waterfall model is most appropriate are
3. implementation, testing, installation, troubleshooting, and ends up at operation and
http://www.academia.edu/6722998/STEPS_INVOLVED_IN_SYSTEM_ANALYSIS_AND_DESIGN_LIFE_CYCLE_O
F_SYSTEMSANALYSIS_AND_DESIGN
plagiarised from source: >1%
1. Typically this means estimating how long the system will
2. to develop, and if it can be completed
3. a given time period using some methods like payback
http://www.tutorialspoint.com/sdlc/sdlc_waterfall_model.htm
plagiarised from source: >1%
1. approach to be followed based on the internal and external
2. Some situations where the use of Waterfall model is most appropriate are
3. implementation, testing, installation, troubleshooting, and ends up at operation and
http://itsabacus.com/android/
plagiarised from source: >1%
1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
2. customize their home screens with shortcuts to applications and widgets
3. allow users to display live content, such as emails and
http://www.slideshare.net/MuhammadUsman19/android-media-player-project-proposal
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
2. customize their home screens with shortcuts to applications and widgets
3. allow users to display live content, such as emails and
http://en.wikipedia.org/wiki/Android_(operating_system)
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. the Open Handset Alliance: a consortium of hardware, software
3. swiping, tapping, pinching and reverse pinching to manipulate on-screen
http://www.slideshare.net/abisek123/final-report-internavisek-signed
plagiarised from source: >1%
1. Typically this means estimating how long the system will
2. to develop, and if it can be completed
3. a given time period using some methods like payback
http://www.slideshare.net/Dishaan/android-ppt-36511838
plagiarised from source: >1%
1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
2. customize their home screens with shortcuts to applications and widgets
3. allow users to display live content, such as emails and
http://www.academia.edu/6409654/OBJECT_ORIENTED_PROGRAMMING_PRINCIPLES
plagiarised from source: >1%
1. that describe the object) and associated procedures known as
2. interact with one another to design applications and computer programs
http://www.macs.hw.ac.uk/~rs46/posts/2014-02-03-objects-boxes-actors-agents.html
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. interact with one another to design applications and computer programs
http://jaider.net/key-concepts/
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. that describe the object) and associated procedures known as
http://www.quora.com/What-are-some-facts-about-coding-in-the-Java-programming-language-that-every-compu
ter-student-should-know
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. that describe the object) and associated procedures known as
https://msritse2012.wordpress.com/2013/01/29/unit-3-programming-paradigm-kishore-k/
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. interact with one another to design applications and computer programs
http://simpledeveloper.com/object-oriented-programming-in-php-part-i/
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. that describe the object) and associated procedures known as
http://coddicted.com/oops-concepts/
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. that describe the object) and associated procedures known as
http://w3guy.com/books-learn-php-object-oriented-programing/
plagiarised from source: >1%
1. that describe the object) and associated procedures known as
2. interact with one another to design applications and computer programs
http://www.slideshare.net/khannabwn/150-17280879
plagiarised from source: >1%
1. Typically this means estimating how long the system will
2. to develop, and if it can be completed
https://www.weheartswift.com/object-oriented-programming-swift/
plagiarised from source: >1%
1. that describe the object) and associated procedures known as
2. interact with one another to design applications and computer programs
http://www.slideshare.net/Girase123rakesh/main-zota-abstract
plagiarised from source: >1%
1. with a brief study of different hardware used in the computerized
2. All the hardware needed here are generally
http://www.codeproject.com/Articles/27775/Object-Oriented-Programming-Concepts
plagiarised from source: >1%
1. data from all other codes and
2. those qualities that make it unique within its
http://www.slideshare.net/rupenparte/database-management-systems-40150526
plagiarised from source: >1%
1. entity B there is only one instance of entity
2. associated with one, zero or many instances of another
http://help.bizagi.com/bpmsuite/en/relationship_types.htm
plagiarised from source: >1%
1. entity B there is only one instance of entity
2. associated with one, zero or many instances of another
http://www.webopedia.com/TERM/E/entity_relationship_diagram.html
plagiarised from source: >1%
1. entity B there is only one instance of entity
2. associated with one, zero or many instances of another
http://www.slideshare.net/tusharsoni58/college-stationery-management-system-45146236
plagiarised from source: >1%
1. Typically this means estimating how long the system will
2. to develop, and if it can be completed
http://www.infobridgesolutions.com/technicalshowcase/android
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. the Open Handset Alliance: a consortium of hardware, software
http://www.cloudiply.com/services/mobileapplications
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. the Open Handset Alliance: a consortium of hardware, software
http://devoops.me/themes/devoops/ajax/ui_jquery-ui.html
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. the Open Handset Alliance: a consortium of hardware, software
http://digimark.bg/en/mobile-os-platforms
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. the Open Handset Alliance: a consortium of hardware, software
http://apid.com.tr/android.php
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. the Open Handset Alliance: a consortium of hardware, software
https://hub.scaleway.com/android.html
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
2. swiping, tapping, pinching and reverse pinching to manipulate on-screen
http://www.slideshare.net/shassan573/process-models-38930047
plagiarised from source: >1%
1. approach to be followed based on the internal and external
2. Some situations where the use of Waterfall model is most appropriate are
http://www.hcltech.com/sites/default/files/android_graphics_power_consumption_optimization_nitin_kumar_gar g_-
_v2.0.pdf
plagiarised from source: >1%
1. swiping, tapping, pinching and reverse pinching to manipulate on-screen
2. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
http://www.slideshare.net/smitpatel10192/etender-system
plagiarised from source: >1%
1. with a brief study of different hardware used in the computerized
2. All the hardware needed here are generally
http://www.pacepacker-services.co.uk/feasibility-studies.htm
plagiarised from source: >1%
1. Typically this means estimating how long the system will
2. a given time period using some methods like payback
http://www.evenja.org/doc/versus/oop
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
2. interact with one another to design applications and computer programs
http://www.academia.edu/5070224/An_Airline_Seat_Reservation_System
plagiarised from source: >1%
1. The phased operation changeover method involves
2. In this approach risk of errors or failures is limited
http://www.answers.com/Q/Changeover_methods_in_Management_information_systems
plagiarised from source: >1%
1. The phased operation changeover method involves
2. In this approach risk of errors or failures is limited
http://www.answers.com/Q/What_are_the_changeover_approaches_of_an_information_system
plagiarised from source: >1%
1. The phased operation changeover method involves
2. In this approach risk of errors or failures is limited
http://www.slideshare.net/sumitpaul14203/software-engineering-unit-1
plagiarised from source: >1%
1. the tasks within the time estimated in the project
http://seminarprojects.com/Thread-payroll-management-system-full-report
plagiarised from source: >1%
1. implementation, testing, installation, troubleshooting, and ends up at operation and
http://www.academia.edu/6328712/SDLC
plagiarised from source: >1%
1. implementation, testing, installation, troubleshooting, and ends up at operation and
http://www.slideshare.net/ManoharIyer/comp-info-sys-asignments
plagiarised from source: >1%
1. implementation, testing, installation, troubleshooting, and ends up at operation and
http://en.wikibooks.org/wiki/Systems_Analysis_and_Design/Introduction
plagiarised from source: >1%
1. implementation, testing, installation, troubleshooting, and ends up at operation and
http://searchsoftwarequality.techtarget.com/definition/waterfall-model
plagiarised from source: >1%
1. implementation, testing, installation, troubleshooting, and ends up at operation and
http://www.slideshare.net/darshakmehta9/software-project-management-tools-45807859
plagiarised from source: >1%
1. the tasks within the time estimated in the project
https://www.theseus.fi/bitstream/handle/10024/6803/Ma_Jun.pdf?sequence=1
plagiarised from source: >1%
1. their applicability to the expected needs of the proposed
https://tr.linkedin.com/in/srturgut
plagiarised from source: >1%
1. their applicability to the expected needs of the proposed
http://www.slideshare.net/jeesuwarrior/documentation-of-railway-reservation-system
plagiarised from source: >1%
1. their applicability to the expected needs of the proposed
https://blog.udemy.com/php-oop-tutorial/
plagiarised from source: >1%
1. represents concepts as "objects" that have data fields
http://www.slideshare.net/usriarc/final-sdlc-project-2
plagiarised from source: >1%
1. their applicability to the expected needs of the proposed
http://www.academia.edu/4935972/ONLINE_ORDERING_SYSTEM_PROJECT_PROPOSAL
plagiarised from source: >1%
1. their applicability to the expected needs of the proposed
http://highered.mheducation.com/sites/0072853182/student_view0/chapter24/chapter_summary.html
plagiarised from source: >1%
1. the tasks within the time estimated in the project
http://rubygarage.github.io/public/oop/
plagiarised from source: >1%
1. that describe the object) and associated procedures known as
http://a4academics.com/final-year-be-project/11-be-it-cse-computer-science-project/63-data-structures-and-algo
rithms-visualization-tool
plagiarised from source: >1%
1. The study will decide if the proposed system will
http://www.academia.edu/1840549/IFIP_Virtual_University_Case_Study
plagiarised from source: >1%
1. The study will decide if the proposed system will
http://www.slideshare.net/ravalsneh/android-application-and-unity3d-game-documentation
plagiarised from source: >1%
1. The study will decide if the proposed system will
http://docarvin.mdl2.com/
plagiarised from source: >1%
1. interact with one another to design applications and computer programs
http://www.tutorialspoint.com/object_oriented_analysis_design/ooad_object_oriented_paradigm.htm
plagiarised from source: >1%
1. interact with one another to design applications and computer programs
http://coding-school.com/perl-oop/
plagiarised from source: >1%
1. representing essential features without including the background details or
http://learn2expert.net/Interview/OOPS_Part05
plagiarised from source: >1%
1. representing essential features without including the background details or
http://www.slideshare.net/praveenjigajinni/5-general-oop-concepts
plagiarised from source: >1%
1. representing essential features without including the background details or
http://www.javatechnologycenter.com/question/java/
plagiarised from source: >1%
1. representing essential features without including the background details or
http://www.academia.edu/1737964/Object_Oriented_Programming_2_Mark_Questions
plagiarised from source: >1%
1. representing essential features without including the background details or
http://www.cpp-home.com/archives/206.html
plagiarised from source: >1%
1. representing essential features without including the background details or
http://www.techopedia.com/definition/3736/abstraction
plagiarised from source: >1%
1. representing essential features without including the background details or
http://wiki.tcl.tk/13398
plagiarised from source: >1%
1. representing essential features without including the background details or
http://www.slideshare.net/AsadMasoodQazi/all-net-questions
plagiarised from source: >1%
1. data from all other codes and
http://planopedia.com/wiki/telos/
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
http://solidswiki.com/index.php?title=Feasibility_Studies
plagiarised from source: >1%
1. to develop, and if it can be completed
http://www.shumon.me/decode/qa/
plagiarised from source: >1%
1. data from all other codes and
http://www.micc.unifi.it/bertini/download/labtecinf/C A Beginner's Guide 2nd Edition (2003).pdf
plagiarised from source: >1%
1. those qualities that make it unique within its
http://www.devarticles.com/c/a/Java/An-Overview-of-Java/1/
plagiarised from source: >1%
1. those qualities that make it unique within its
http://www.academia.edu/5903896/Chapter_1_The_Creation_of_C
plagiarised from source: >1%
1. those qualities that make it unique within its
http://www.iosrjournals.org/iosr-jce/papers/Vol15-issue1/K1515966.pdf?id=7571
plagiarised from source: >1%
1. those qualities that make it unique within its
http://www.byte-notes.com/oop-concepts-c
plagiarised from source: >1%
1. those qualities that make it unique within its
http://i-learn.uitm.edu.my/OERApp/CourseFile/818391780/Topic 1 - Introduction to Object Oriented
Programm.swf
plagiarised from source: >1%
1. those qualities that make it unique within its
http://www.java-samples.com/showtutorial.php?tutorialid=42
plagiarised from source: >1%
1. those qualities that make it unique within its
http://www.slideshare.net/SafiUllah2/hospital-management-system-25384877
plagiarised from source: >1%
1. entity B there is only one instance of entity
http://www.slideshare.net/vilasitanandamuri/vilasitaoracle-basic-fundamentals
plagiarised from source: >1%
1. entity B there is only one instance of entity
http://www.slideshare.net/edhole/mba-ebooks-edhole-35029754
plagiarised from source: >1%
1. a given time period using some methods like payback
http://web.simmons.edu/~benoit/lis486/s13/readings/DataModeling-ER1.pdf
plagiarised from source: >1%
1. entity B there is only one instance of entity
http://ecomputernotes.com/fundamental/what-is-a-database/basic-construction-of-e-r-modeling
plagiarised from source: >1%
1. entity B there is only one instance of entity
http://www.freetutes.com/systemanalysis/sa7-degree-of-entity-relationship-type.html
plagiarised from source: >1%
1. entity B there is only one instance of entity
http://www.slideshare.net/roying/lecture-2-conceptualizing-a-festive-event
plagiarised from source: >1%
1. a given time period using some methods like payback
https://www.st.cs.uni-saarland.de/edu/se/2013/files/slides/04-Managing Projects.pdf
plagiarised from source: >1%
1. Known risks are those that can be uncovered
http://www.slideshare.net/JalPari13/document-for-voice-banking-system-mini-project
plagiarised from source: >1%
1. associated with one, zero or many instances of another
http://feedback.bizagi.com/suite/en/responses/data-navigation-from-a-collection-attached-to-wfuser
plagiarised from source: >1%
1. associated with one, zero or many instances of another
http://post.milathan.com/2015/01/
plagiarised from source: >1%
1. .Net is considered by many to
http://www.velmultimedia.com/android.pdf
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
https://www.st.cs.uni-saarland.de/edu/se/2012/lecture-slides/06-Managing-Projects.pdf
plagiarised from source: >1%
1. Known risks are those that can be uncovered
http://www.bashguru.com/2009_12_01_archive.html
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
http://www.bashguru.com/2010/12/shell-script-to-generate-fibonacci.html
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
http://www.bashguru.com/2008_03_01_archive.html
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
http://www.bashguru.com/2010/03/unixlinux-advanced-file-permissions.html
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
http://www.onestoplinux.com/p/android_25.html
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
http://www.leagoo.com.my/cs-knowledge.html
plagiarised from source: >1%
1. Linux kernel, and designed primarily for touch
https://rs2tech.com/RS2WebApp/Universalv3.aspx
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
https://www.devbridge.com/chicago-mobile-development/
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
http://www.wccnet.edu/about-us/mobile/
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
http://www.insitesoft.com/blog/is-your-website-ready-for-mobile-friendly-search/
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
https://www.vasont.com/news-releases/vasont-app-support.html
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
http://adxmedia.com/mobile-web-design.html
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
http://www.aaos.org/news/aaosnow/jun12/clinical11.asp
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
http://www.bbc.com/news/business-13962653
plagiarised from source: >1%
1. mobile devices such as smart phones and tablet
http://ijrcm.org.in/download.php?name=ijrcm-2-IJRCM-2_vol-3_2013_issue-11-art-16.pdf&path=uploaddata/ijrc m-
2-IJRCM-2_vol-3_2013_issue-11-art-16.pdf
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
http://www.infobridgesolutions.com/technical-showcase
plagiarised from source: >1%
1. Android was unveiled in 2007 along with the founding
http://www.angieslist.com/articles/how-much-does-new-lawn-mower-cost.htm
plagiarised from source: >1%
1. requires regular maintenance so it won’t
https://readytogo.microsoft.com/en-us/_layouts/Download.aspx?SourceUrl=https://readytogo.microsoft.com/en-
us/Asset/RTG Anonymous Asset Library/40 ModernBiz - Demo Script.docx
plagiarised from source: >1%
1. failure and we can prevent data
http://www.fibtex.lodz.pl/2014/5/34.pdf
plagiarised from source: >1%
1. be assessed as very low
http://onlinelibrary.wiley.com/doi/10.1111/j.1574-695X.2006.00101.x/full
plagiarised from source: >1%
1. be assessed as very low
https://fp7.portals.mbs.ac.uk/Portals/59/docs/MC deliverables/WP2 S Durst working
paper1_IntangibleRiskDisclosure.pdf
plagiarised from source: >1%
1. be assessed as very low
http://www.mrc.ac.uk/documents/pdf/mrc-submission-ec-concept-paper-on-revision-of-clinical-trials-directive-m ay-
2011/
plagiarised from source: >1%
1. be assessed as very low
http://www.academia.edu/6169082/Report_on_Android
plagiarised from source: >1%
1. the Open Handset Alliance: a consortium of hardware, software
http://thegamesdb.net/platforms/
plagiarised from source: >1%
1. the Open Handset Alliance: a consortium of hardware, software
http://codexdesign.in/android-applications-development/
plagiarised from source: >1%
1. swiping, tapping, pinching and reverse pinching to manipulate on-screen
http://www.scielo.br/scielo.php?pid=S1519-69842013000200279&script=sci_arttext&tlng=es
plagiarised from source: >1%
1. be assessed as very low
http://canadiantaskforce.ca/files/guidelines/2015-lung-cancer-protocol-en.pdf
plagiarised from source: >1%
1. be assessed as very low
http://www.underconsideration.com/brandnew/archives/new_logo_for_android.php
plagiarised from source: >1%
1. swiping, tapping, pinching and reverse pinching to manipulate on-screen
http://techcrunch.com/topic/product/android/
plagiarised from source: >1%
1. swiping, tapping, pinching and reverse pinching to manipulate on-screen
http://en.wikipedia.org/wiki/LuneOS
plagiarised from source: >1%
1. swiping, tapping, pinching and reverse pinching to manipulate on-screen
http://www.gsu.by/biglib/GSU/Иностранных языков/Презентации студентов/Английский для
математиков/Android.ppt
plagiarised from source: >1%
1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
http://knowyourmeme.com/memes/subcultures/android-os
plagiarised from source: >1%
1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
http://jderobot.org/Evelinfv
plagiarised from source: >1%
1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
http://www.youtube.com/watch?v=6Nyt_gjiLU8
plagiarised from source: >1%
1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
http://www.slideshare.net/fdgiraldo/m-project-planning
plagiarised from source: >1%
1. be assessed as very low
http://www.sanfoundry.com/software-engg-mcqs-project-management/
plagiarised from source: >1%
1. be assessed as very low
http://www.oiirj.org/oiirj/jan-feb2014/30.pdf
plagiarised from source: >1%
1. customize their home screens with shortcuts to applications and widgets
http://www.edbpriser.dk/skaerm/philips-272s4lpjcb-sort-id-8958560.aspx
plagiarised from source: >1%
1. customize their home screens with shortcuts to applications and widgets
http://itsabacus.com/mobile-application/
plagiarised from source: >1%
1. customize their home screens with shortcuts to applications and widgets
http://www.academia.edu/10096820/B041130610
plagiarised from source: >1%
1. customize their home screens with shortcuts to applications and widgets
http://www.liceomundofeliz.com/web/track-iphone/whatsapp-spy-location.html
plagiarised from source: >1%
1. allow users to display live content, such as emails and
http://www.finalconcept.com.au/article/view/android-account-manager-step-by-step-2
plagiarised from source: >1%
1. allow users to display live content, such as emails and
http://odvkc.com/logos/sms-location/phone-tracker-location.html
plagiarised from source: >1%
1. allow users to display live content, such as emails and
http://www.youtube.com/watch?v=cESqm80XPXk
plagiarised from source: >1%
1. allow users to display live content, such as emails and
http://pubs.sciepub.com/ajmm/2/2/1/
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
http://www.answers.com/Q/What_is_direct_changeover
plagiarised from source: >1%
1. The phased operation changeover method involves
http://www.answers.com/Q/Criticism_of_system_approach
plagiarised from source: >1%
1. In this approach risk of errors or failures is limited
http://www.answers.com/Q/What_is_a_phase_changeover
plagiarised from source: >1%
1. The phased operation changeover method involves
https://www.linkedin.com/pulse/value-feasibility-studies-david-fisher-the-web-lender
plagiarised from source: >1%
1. feasibility assessment is to determine the positive economic
http://www.answers.com/Q/What_is_a_SALS_approach_lighting_system
plagiarised from source: >1%
1. In this approach risk of errors or failures is limited
http://www.slideshare.net/mahmoudghonim/dot-net-interviewquestions-29529402
plagiarised from source: >1%
1. data from all other codes and
GUJARAT TECHNOLOGICAL UNIVERSITY
[UNDERTAKING ABOUT ORIGINALITY OF WORK]
We hereby certify that we are the sole authors of this IDP/UDP project report and that neither any part of
this IDP/UDP project report nor the whole of the IDP/UDP Project report has been submitted for a degree
by other student(s) to any other University or Institution.
We certify that, to the best of our knowledge, the current IDP/UDP Project report does not infringe upon
anyone’s copyright nor violate any proprietary rights and that any ideas, techniques, quotations or any
other material from the work of other people included in our IDP/UDP Project report, published or
otherwise, are fully acknowledged in accordance with the standard referencing practices. Furthermore, to
the extent that we have included copyrighted material that surpasses the boundary of fair dealing within
the meaning of the Indian Copyright (Amendment) Act 2012, we certify that we have obtained a written
permission from the copyright owner(s) to include such material(s) in the current IDP/UDP Project report
and have included copies of such copyright clearances to our appendix.
We have checked the write up of the present IDP/UDP Project report using anti-plagiarism database and it
is in the allowable limit. In case of any complaints pertaining to plagiarism, we certify that we shall be solely
responsible for the same and we understand that as per norms, University can even revoke BE degree
conferred upon the student(s) submitting this IDP/UDP Project report, in case it is found to be plagiarised.
Team:
Enrolment number Name Signature
110410107004 Krunal Ashwinkumar Patel
110410107063 Devang Devendrakumar Mistry
110410107016 Achal Ghanshyambhai Patel
Place: Vadodara Date: 20/05/2015
Name of Guide
Prof. Barkha M Joshi Signature of Guide
Page i
ACKNOWLEDGEMENT
Our efforts in making this project, a success, would not have been of use without the kind
support and help of many individuals and seniors. We would like to extend our sincere thanks
to all of them.
We are very grateful to our Principal DR. J. V. Deshkar for providing us with an
environment where we could able to complete our project successfully.
We are grateful to Prof. BARKHA M. JOSHI for her guidance and constant supervision as
well as for providing necessary information regarding the project and also for her support in
completing the project. We would also like to thank Prof. BIJAL J. TALATI (Head of the
Department) for helping us and providing her support for carrying out this project.
We would like to express gratitude towards our parents & friends for their kind co-operation
and encouragement which helped us in completion of this project. We would like to express
special gratitude and thank you to faculties and technicians of our college for giving us such
attention and time.
Our thank you and appreciation also goes to MGVCL, for providing us the necessary
infrastructure and facilities, along with worthy guidance in developing this project. It has
been a great experience working with MGVCL, while undertaking this project. Also we
would like to thank you our project guide Mr. C N Pendor (Superintending Engineer) for
all his support during the development of the project.
Page ii
ABSTRACT
In this project we take up one segment of the MGVCL (GEB), which is the
tendering and tracking of the various projects in different sectors. In this
project we build a web application which will contain the 3 different modules.
The first module will contain the Authentication process i.e. User management
and Vendor Management(Corporation interested to work for the project
proposed by MGVCL (GEB) for e.g. companies like reliance, TATA etc.).
The registered and authenticated vendors will be allowed to access the
database. The MGVCL (GEB) will provide their project plans and definition as
per the need in different sectors. The Second Module will contain the tendering
process where the optimum and reliable vendor will be selected which meets
the requirements of MGVCL (GEB) and the confirmation of reject or approval
will be announced through mails to each vendor. The third module will contain
the project progress report where the MGVCL (GEB) will assign milestones
and the project manager to the vendor. Additionally we will develop a mobile
application that will be used for live project tracking. With this system
MGVCL (GEB) can propose the project and can do their progress track
efficiently. This will also reduce the complexity and manual work involved in
tracking process.
FRONT - END: ASP.NET, HTML 5, ANDROID
BACK – END: SQL
Page iii
LIST OF TABLES
Table No. Table Description Page No.
1 Risk Analysis 11
2 Staff Data Dictionary 34
3 Vendor Data Dictionary 34
4 Project Data Dictionary 34
5 Bid Data Dictionary 35
6 Milestone Data Dictionary 35
7 Intermediate Report Data Dictionary 35
8 Test Values/Cases 57
Page iv
LIST OF FIGURES
Figure No. Figure Description Page No.
1 System Flow 7
2 Gantt Chart 8
3 Waterfall Model 13
4 Class Diagram 16
5 Vendor Management Use Case Diagram 18
6 Staff Management Use Case Diagram 19
7 Project Announcement and
Configuration Use Case Diagram 20
8 Tender Bidding Use Case Diagram 21
9 Project Progress Tracking Use Case Diagram 22
10 Project Progress Analysis Use Case Diagram 23
11 Vendor Registration Sequence Diagram 25
12 Tender Selection and Project Progress
Analysis Sequence Diagram 25
13 Vendor Management Activity Diagram 27
14 Project Progress Tracking Activity Diagram 28
15 Database Design Diagram 29
16 Entity-Relationship (ER) Diagram 31
17 State Diagram 33
18 Observation Matrix Canvas 36
Page v
19 Ideation Canvas 38
20 .NET Architecture 39
21 Android Architecture 40
22 Phase Implementation Environment 41
23 Sign Up for Vendor 42
24 Sign Up Validation Parameters for Vendor 42
25 Sign In for Vendor, Admin and Staff 43
26 Password Recovery 43
27 Dashboard (Admin Side) 44
28 List of Accepted or Awarded Projects (Vendor Side) 44
29 Project Search (Admin Side) 45
30 Project Detail (Admin Side) 45
31 Project Detail Validation Parameters (Admin Side) 46
32 Vendor Search (Admin Side) 46
33 Edit Vendor Details (Admin Side) 47
34 Staff Search (Admin Side) 47
35 Bid Selection (Admin Side) 48
36 Selected Bid (Admin Side) 48
37 Milestones (Admin Side) 49
38 Form for Declaring of New Milestone (Admin Side) 49
39 Milestone Detail Received from Android Application
Sample 1 (Admin Side) 50
Page vi
40 Milestone Detail Received from Android Application
Sample 2 (Admin Side) 50
41 Intermediate Reports (Admin Side) 51
42 Intermediate Report Detail Received from Android
Application (Admin Side) 51
43 Map Showing Location and GPS Coordinates (Admin Side) 52
44 List of Bids Placed on Various Projects (Vendor Side) 52
45 Contact Us (Vendor Side) 53
46 Assigned Projects (Staff Side) 53
47 Sign In for Staff (Android Application) 54
48 Assigned Projects (Android Application) 54
49 Assigned Milestones (Android Application) 55
50 Form to Fill Milestone Detail (Android Application) 55
Page vii
INDEX
Acknowledgement i
Abstract ii
List of Tables iii
List of Figures iv
Index vii
Chapter: 1 Introduction
1.1 Company Profile 1
1.1.1 Brief History 1
1.1.2 Company Details 1
1.1.3 Company Objective 1
1.2 Introduction to the Project 2
1.2.1 Background 2
1.2.2 Problems with the Current System 2
1.2.3 Aim/Definition of the Project 2
1.2.4 Scope of the Project 3
1.2.5 Purpose/Objectives of the Project 3
1.3 Brief Literature Review and Prior Art Search (PAS) 4
1.3.1 Patent Studied 4
1.3.2 Vendor/Market Search 4
Page viii
1.4 Materials/Tools Required 5
1.4.1 Hardware Requirements 5
1.4.2 Software Requirements 5
1.4.3 Tools and Technology Used 5
1.4.4 Communication Interface 5
1.4.5 Constraints 5
1.5 System Flow 7
1.6 Project Plan 7
1.6.1 Project Schedule 7
1.6.2 Gantt Chart 8
Chapter: 2 Design: Analysis, Design Methodology and Implementation Strategy
2.1 Feasibility Study/Analysis 9
2.1.1 Operational Feasibility 9
2.1.2 Economic Feasibility 9
2.1.3 Technical Feasibility 10
2.1.4 Schedule Feasibility 10
2.2 Risk Management 10
2.2.1 Risk Identification 10
2.2.2 Risk Analysis 11
2.3 Requirement Analysis 11
2.3.1 Functional Requirements 11
2.3.2 Non-Functional Requirements 12
Page ix
2.4 Design Methodology 13
2.4.1 Waterfall Model (Software Development Model) 13
2.4.2 Advantages of the Waterfall Model 14
2.4.3 Why We Chose this Model? 14
2.5 System Design Principles 14
2.5.1 Class Diagram 15
2.5.2 Use Case Diagram 17
2.5.3 Sequence Diagram 24
2.5.4 Activity Diagram 26
2.5.5 Database Design Diagram 29
2.5.6 Entity-Relationship (ER) Diagram 30
2.5.7 State Diagram 32
2.5.8 Data Dictionary 34
2.6 Canvases Analysis, Design and Implementation 35
2.6.1 Observation Matrix 35
2.6.2 Ideation Canvas 37
2.7 Implementation Strategy 38
2.7.1 Microsoft ASP.NET Framework 38
2.7.2 Android 40
2.7.3 Implementation Environment (Phase Implementation) 41
Page x
Chapter: 3 Implementation
3.1 Screenshots/User Interface Design 42
3.2 Testing Plan 56
3.2.1 Testing Strategy 56
3.2.2 Test Values/Cases 57
Chapter: 4 Summary of the Results and Conclusion
4.1 Summary of the Results 62
4.2 Usefulness with Respect to Existing Solution 62
4.3 Limitations of Our System 62
4.4 Future Enhancement 63
4.5 Conclusion 63
References
Appendix I Periodic Progress Reports (PPR)
Appendix II Business Model Canvas (BMC) and its Reports
Appendix III Patent Drafting Exercise
Page 1
CHAPTER 1 INTRODUCTION
1.1 COMPANY PROFILE
1.1.1 BRIEF HISTORY
As a part of efforts towards restructuring of Power Sector, a new Company known as
Madhya Gujarat Vij Company Limited was incorporated on 15th September, 2003, by
Gujarat Electricity Board (GEB). The Company obtained the Certificate of Commencement
of Business on 15th October, 2003.
As a part of Power Reform Process, Gujarat Electricity Board (GEB), the promoting
body, has been un-bundled effective from 1st April, 2005, into separate seven Companies
with functional responsibilities with complete autonomous operation for:
 Generation
 Transmission
 Distribution
 Trading
Accordingly, the distribution undertakings and functions of the Central Distribution
Zone of the erstwhile GEB stand transferred to and vest in the Company effective from 1st
April, 2005. The company has become operational effective from 1st April, 2005.
1.1.2 COMPANY DETAILS
Company Name: Madhya Gujarat Vij Company Limited (MGVCL)
Company Address: Sardar Patel Vidyut Bhavan, Race Course, Vadodara–390007
Company Type: Power Distribution Public Limited (Subsidiary of GUVNL)
Contact Person: C N Pendor
1.1.3 COMPANY OBJECTIVE
Madhya Gujarat Vij Company Limited is committed to Distribute and maintain Reliable
Electric Power, Satisfy all its Customer through Excellence in service by way of Safe and
Sturdy Distribution Network with Dedication to Continual Improvement in all sphere of
Activities.
The company is responsible for reliable and affordable power distribution to residential
areas, commercial complexes, streetlights, water works, agriculture, traction as well as
industries.
Page 2
1.2 INTRODUCTION TO THE PROJECT
1.2.1 BACKGROUND
Project Tendering and Tracking Application is a type of web application dedicated for
providing tendering and tracking of various projects in different areas. The goal of our web
application is to make the online tendering more efficient with bidding. For Progress
Tracking of the all live projects, a mobile application will be developed.
Project Tendering and Tracking Application also utilises advanced techniques like
Camera for taking photo of the progress work on ongoing project sites and viewing uploaded
contents on web application sent from android application.
1.2.2 PROBLEMS WITH THE CURRENT SYSTEM
Currently there is a website like http://www.mgvcl.com/ which provides most of the
necessary information as list of tenders announced, list of the awarded tenders, viewing of
terms and conditions of every tender awarded etc.
But following are some points which are not available and we aim at improving that:
 Restricted Mobility
 Poor User Interface
 No Proper Search Medium
 Less Graphical Content, Making it Mundane
 Non-Efficient Modularity
 Haphazard Data Retrieval
 Non Centralized Data Storage
 Security Problems
 Requires More Human Resource
 Much Costlier and Consumes Longer Time
1.2.3 AIM/DEFINITION OF THE PROJECT
Project Tendering and Tracking Application is a system which automates various tasks
such as tendering, bidding and tracking of the live projects. The system will provide user the
interface where he/she will be able to perform the track of the organizations live projects and
be assured about the progress which is not possible by depending upon the human force.
Project Tendering and Tracking Application is a concept of supporting the MGVCL by
the means of easy bidding, better administration and more technology oriented way of
tracking with the help of Internet that makes current way of tendering more interesting.
Project Tendering and Tracking Application aims to overcome this:
 Enhanced Productivity and Satisfaction: Our system helps in improving
communication system between the Vendors, Staff and Admin. The process of real time
monitoring considerably reduced customer response time thus, enhanced their
efficiency.
 More Saving in Costs: Reduced waiting times from vendor side as they can see the
projects awarded to them within seconds, minimized staff recruitment cost helps to give
an efficient system.
Page 3
 Efficient Management: Before our system, Admin once faced problems like
mismanagement, low level of communications etc. But after the incorporation of our
System, it became easy for the Admin to manage as Admin can now be in touch with all
the aspects of the system, their vendors and staff.
 A Common Platform and Efficient Usage of Services: The application brings
several new vendors on a single platform and helps Admin retain the existing ones with
the efficient service and a user- friendly application.
1.2.4 SCOPE OF THE PROJECT
Project Tendering and Tracking Application exists to fulfill the basic principles
of tendering, which are to Reduces Paper work, human effort and consumes less time. The
Tracking part makes project progress to be performed efficiently. Also The Application will
provide an extra security by providing access to only authenticate users.
Project Tendering and Tracking Application system is helpful for all age of people. If
this type of system will be applied in real world then this system will create a revolution into
the tendering and tracking mechanism service.
1.2.5 PURPOSE/OBJECTIVES OF THE PROJECT
Project Tendering and Tracking Application purpose/objective is to provide user
friendly environment to vendors so that they can easily be able to interact with the
organization i.e. place their bids and get results. Application will provide the user with the
tools to develop progress charts, take pictures of location and other such activities which will
ease up their tracking mechanism of the projects that the organization is currently working
on.
Project Tendering and Tracking Application is a Web application project which is
developed in ASP.Net as well as an Android Application. The Application is useful for the
Vendors who can access this facility such as Bid on various announced projects, include their
terms and conditions on various projects and various other facilities. The Application is also
useful for MGVCL as MGVCL can now manage their staff for tracking of various awarded
projects.
Project Tendering and Tracking Application objective is to provide the below
mentioned advantages and is very well able to provide these advantages:
 More Secure
 Automated and Accurate Process
 Lifelong Storage and Back Up as well as Restore
 Centralized Data Storage
 Efficient Data Retrieval
 Ease Mobility
 Live Project Tracking with GPS and Image
 Less Costlier
 Less Human Resource Involvement
Page 4
1.3 BRIEF LITERATURE REVIEW AND PRIOR ART SERCH (PAS)
1.3.1 PATENT STUDIED
 Patent Number: WO 2007066357 A2
 Title of Invention: A process for securing tendering system
 Summary of Invention: The main object of the present invention is to provide a
process for securing tendering system. The other object is to provide a unique
technique/mechanism for an automatic system for electronically conducting on the
Internet/ Intranet the complete process of Tendering/ Procurement by Government and
professional corporate organizations globally. Another object is to provide e-tendering
that includes all steps from Obtaining of Internal Approvals (i.e. the Pre-Tendering
processes) to Award of Contract and Monitoring of the Award and all intermediate
steps exemplified by online submission of digitally-signed and encrypted bids in time-
locked event managed tender boxes, public online tender-opening event. Further the
system is provided with comprehensive Security and Transparency related features
necessary for Transparent functioning as required by/ expected of Government
organizations and Multi-lateral agencies globally. Yet other object is to provide
electronic tendering system with flexibility for handling open as well as limited tenders.
Yet another object is to provide a system having on line facility for appending
corrigenda, storing tender/bidding documents, accessibility to bidding documents only
by the authorized bidders (in case of limited tenders), ability to access entire tender/
bidding documents by prospective suppliers, facility for online as well as offline
payment, use of secured means by the bidders themselves, facility for on line
negotiations and meetings , comprehensive matrix for multiple levels authorization for
each organization, ability to integrate manual bidders. Still other object is to provide a
system with online customization of the tendering processes to align these to the
tendering policy of the concerned Government Organization and Rules for each tender,
which does not require any technically skilled personnel.
1.3.2 VENDOR/MARKET SEARCH
It is difficult to perform all the operations such as bidding, tracking etc. at one stop.
Mentioned below are some points which are seen in the current market:
 Not Much Attractive User Interface
 Not all Modules Specified on the Homepage are Fully Functional
 Incomplete Information
 Scattered Information
 A Common Interactive Platform
 Less Graphical Content gets it Mundane
 No Proper Search Medium
Page 5
1.4 MATERIALS/TOOLS REQUIRED
1.4.1 HARDWARE REQUIREMENTS
 Client Side: (For best performance) Any GUI based terminal having at least
800*600,256-color displays.1024 X 768 32 bit recommended.
 Server Side:
 Supported Architectures: x86, x64, ia64 (Windows Server 2008)
 RAM: 96 MB (256 MB Recommended)
 400 MHz CPU (1.0 GHz Recommended)
 1 GB of Hard Disk Space.
1.4.2 SOFTWARE REQUIREMENTS
 Operating System: Microsoft Windows XP, Microsoft Windows Server 2003,
Windows Vista, Windows 7, Windows Server 2008.
 Web Server: IIS 6.0 and Higher
 Server Side Scripting: .NET Framework 3.5 and Higher
 Database Management System: SQL Server 2005 and Higher
 Other Software Tools: Microsoft Word 2007 and Higher
1.4.3 TOOLS AND TECHNOLOGY USED
This phase of the software development process deals with a brief study of different
hardware used in the computerized system. There is a list of hardware materials used during
the making and also during the use of the proposed project. All the hardware needed here are
generally the basic configuration of a typical office computer. A list of the hardware
requirement used in the system is given below:
 Front End: Microsoft Visual Studio 2010, ASP.Net 4.0 with C#.Net 2010
 Back End: SQL Server 2008 R2
 Documentation Tools: MS Office Word 2007, MS Office Visio 2007
 Reporting Tool: MS Office Excel 2007
 Hardware Requirements: RAM: 2GB, Hard Disk: 80GB, Processor: Dual Core or
Higher, Gateway/routers, Monitor, Keyboard, Mouse, Microphone, Webcam and its
utility drivers.
 Operating System: Windows XP version or Higher. MAC OS and LINUX.
1.4.4 COMMUNICATION INTERFACE
The interface of our application mainly includes hypertext transfer protocol. The main
communication interface is the terminal node, which the user uses.
1.4.5 CONSTRAINTS
 Regulatory Policies: System does not apply to any regulatory policy as the project
developed is a Web-Based application to be used as product for the personalized use of
the company’s internal use itself.
 Hardware Limitations: The installation of Microsoft Visual Studio.NET requires
that the RAM cannot be less than 500 MB but ideal would be 2GB and the processor
cannot be less than 1.4 GHz speed.
Page 6
 Interfaces to Other Applications: This system can be easily interfaced with the
underlying windows application for uniform flow from the windows application to the
Web-based application and vice versa. This eases the way notifications can be provided
to the administrator for the various activities done by the retailer / sales person. When
the system will become functional the Client Side systems require the presence of
Microsoft Office 2007 or above. This enables them to generate reports in the form of
office documents. The system can easily locate the presence of Office and generate
reports in that format without the user performing any changes for the same to be
functional.
 Higher Order Language Requirements: System Web-Based module uses
ASP.NET 3.5 as it is the most viable technology for the project. SQL SERVER 2005 is
used as the database system as it is most compatible with .NET 3.5 and is easy to
simulate. C# is used as the programming language with ASP.NET 3.5 as it is much
more concise than many of the other .NET languages like VB. There are lots of places
where there is no need to Post Back the page to server and only client side scripting
would suffice the requirements so java scripts were incorporated along with the
ASP.NET code.
 Safety and Security Consideration:
 Safety: The user cannot see the system source code and thus when browsing no
changes can be made into the system. When the session gets timed out or the user
logs off, after that, the query string supposedly obtained using unfair means will be
of no use as the session variables are removed and there is no existence of the data
present which can be manipulated.
 Security: As there are many hackers trying to invade the system using unfair
means an alternative was implemented which could reduce the threat of stealing of
passwords quite a lot. The passwords will be generated again after every one month.
When need to login to the system the password is sent via email. Thus, there are very
less chances of passwords being hacked as they keep on changing every month.
Page 7
1.5 SYSTEM FLOW
Figure 1 System Flow
1.6 PROJECT PLAN
1.6.1 PROJECT SCHEDULE
Software Project Scheduling Principles:
 Compartmentalization: The product and process must be decomposed into a
manageable number of activities and tasks.
 Interdependency: Tasks that can be completed in parallel must be separated from
those that must be completed serially.
 Time Allocation: Every task has start and completion dates that take the task
interdependencies into account.
 Effort Validation: Project manager must ensure that on any given day there is
enough staff members assigned to complete the tasks within the time estimated in the
project plan.
 Defined Responsibilities: Every scheduled task needs to be assigned to a specific
team member.
 Defined Outcomes: Every task in the schedule needs to have a defined outcome
(usually a work product or deliverable).
 Defined Milestones: A milestone is accomplished when one or more work products
from an engineering task have passed quality review.
Vendor
Registration
Project
Announcement
Vendor Submits
For Project
Tender
Award Project
Tender
Add Milestones
to Project
Submit the
Project Status
Report
View Project
Progress Records
Compare Actual
Progress with
Planned Schedule
Generate Analysis
Report
Page 8
1.6.2 GANTT CHART
Timeline (Gantt) chart enables software planners to determine what tasks will be need
to be conducted at a given point in time (based on estimates for effort, start time, and duration
for each task).
Figure 2 Gantt chart
Page 9
CHAPTER 2
DESIGN: ANALYSIS, DESIGN METHODOLOGY AND
IMPLEMENTATION STRATEGY
2.1 FEASIBILITY STUDY/ANALYSIS
It is an estimate that is made up of whether the users of the system need to be satisfied
using the current software and hardware technologies. The study will decide if the proposed
system will be cost-effective from a business point of view and if it can be developed within
given existing budgetary constraints. A feasibility study should be relatively cheap and quick.
So, the result should inform the decision of whether to go ahead or not. Major areas for
feasibility study are discussed below:
2.1.1 OPERATIONAL FEASIBILITY
Operational Feasibility checks whether the system is operationally feasible or not. It
will examine the various operational parameters for the same. We will check operational
feasibility of the given system by answering certain questions which are listed below:
 Does system provide adequate throughput and response time?
 This system will provide adequate throughput and adequate response time to make
the system operationally feasible, make faster operation of different modules of the
system. Response time is very critical for the system for its faster operation.
 Does the system make maximum use of available resources including people, time,
flows of forms, minimum processing delays and the like?
 Our system will make maximum use of available resources such as utilizing
maximum functionalities of .NET, also utilizes maximum man-power and along with
it, it maintains time duration. It will also maintain various flows of forms for the
proper working of the system. It will keep a watch on the processing and provides
necessary functionalities to overcome the processing delays. It will utilize each
resource with proper time duration to maintain the efficient working of the system.
This is necessary to make the system operationally feasible.
 Does the system provide desirable & reliable service to those who need it? Is the
system flexible and expandable?
 Our system will provide desired characteristics and services to the various users.
The system follows three tier architecture of application development with
Presentation, Business and Data access separated into different parts / tiers which
have their own role as their name suggests. If there is any expansion in one of the
tiers, only that one needs to be amended. For e.g. a change in presentation tier does
not affect the business class library.
2.1.2 ECONOMIC FEASIBILITY
The purpose of the economic feasibility assessment is to determine the positive
economic benefits to the organization that the proposed system will provide. It includes
quantification and identification of all the benefits expected. This assessment typically
involves a cost/ benefits analysis.
The initial cost incurred to change the current system will very large as it requires the
use of new devices like Tablets and GPS Devices. However once the system will be updated,
there will minimal expenditure is required in the future.
Page 10
2.1.3 TECHNICAL FEASIBILITY
The technical feasibility assessment is focused on gaining an understanding of the
present technical resources of the organization and their applicability to the expected needs of
the proposed system. It is an evaluation of the hardware and software and how it meets the
need of the proposed system.
This new system will require new resources such as GPS devices, Tablets. This will be
a major change in current flow of work as the equipment has changed significantly. The use
of these resources will increase the efficiency of the system.
2.1.4 SCHEDULE FEASIBILITY
A project will fail if it takes too long to be completed before it is useful. Typically this
means estimating how long the system will take to develop, and if it can be completed in a
given time period using some methods like payback period. Schedule feasibility is a measure
of how reasonable the project timetable is. Given our technical expertise, are the project
deadlines reasonable? Some projects are initiated with specific deadlines. You need to
determine whether the deadlines are mandatory or desirable.
Our project schedule is feasible as it will be completed within 1 year. First 6 months
will be taken for requirement gathering, analysis and designing of the system. The next 6
months will be required for an actual implementation of the system. The actual
implementation of the system will take longer time to be applied practically as the new
system is drastically different form the current system.
2.2 RISK MANAGEMENT
There are different categories of risk. Risk that are to be analyzed like project risks ,
business risks , technical risks , known risks , predictable risks and unpredictable risks.
Project risks identify potential budgetary, schedule, personal that includes staff and
organization, resources, customers and requirement problems and they impact on software
projects. Technical risks identify potential design; implementation, interface, verification,
maintenance problems, specification ambiguity, technical uncertainness and technical
obsolesce. Business risks threaten the viability of the software to be built. Known risks are
those that can be uncovered after careful evaluation of the project plan, the business and
technical environment in which the project is being developed. Predictable risks are
extrapolated from past project experience. Unpredictable risks are extremely difficult to
identify in advance.
2.2.1 RISK IDENTIFICATION
 Technology: While system is building / compiling and end-user request to access
and manipulate information then system get re-configure and user get configuration
error.
 Hardware: Website runs on some Server. So all hardware related problems like
power failure and server down problems must be managed effectively by our hardware
team.
 Software: Website is depending on the database. There are other external libraries
and tools like Web-Server, and client tools etc. requires regular maintenance so it won’t
get failure and we can prevent data lost.
Page 11
 People: As Website is a database driven which contains lots of concepts and tools
that are used, it require understanding all features and functionalities, also how it get
implemented and affected by web-module. So we need to interact to Technical Manager
and other employees to understand tool and concepts effectively. So we try to make this
risk as small as by writing tutorials about tools and techniques we will be using.
 Schedule: Each team member should respect the deadlines that the team has
decided. When a team member knows that he will be unable to respect a given deadline,
he should inform the other team members as soon as possible (preferably more than two
days before the deadline), so that the team can find a way to solve the problem.
2.2.2 RISK ANALYSIS
 Probability of the risks might be assessed as very low (<10%), low (10-25%),
moderated (25-50%), high (50-75%), or very high (>75%).
 Effects of the risk might be assessed as catastrophic, serious or tolerable.
Table 1 Risk Analysis
RISK PROBABILITY EFFECT
Technology Moderate Tolerable
Hardware Moderate Critical
Software Low Tolerable
Schedule High Critical
People Moderate Tolerable
Due To Illness Low Tolerable
2.3 REQUIREMENT ANALYSIS
2.3.1 FUNCTIONAL REQUIREMENTS
 Staff Management
 Create Staff
 Search Staff
 Update Staff
 Deactivate Staff
 Staff Access Management
 Vendors Management
 Vendor Registration
 Search Vendors
 Vendor Verification
 Update Vendor
 Deactivate Vendor
 Vendor Expertise Management
 Vendors History Management
Page 12
 Project Announcement & Configuration
 Announce Project
 Search Project
 Update Project
 Cancel Project
 Assign Manager to Project
 Tender Bidding
 Bid for Project Tender (Vendor)
 View Project Tender Bids (Staff)
 Analyze Vendor History
 Award Project Tender
 Email Project Tender Award
 Project Planning
 Add Milestones to Project
 View Project Schedule
 Project Progress Tracking (Mobile App)
 Take Picture of Actual Project Progress
 Record GPS Coordinates & Timestamp
 Submit the Project Status Report
 View Pending Milestones
 Complete Milestone
 Project Progress Analysis
 View Project Progress Records
 Compare Actual Progress with Planned Schedule
 Verify Picture and Location of the Progress on Map
 Overdue Milestone Notification
 Analysis Reports
 Project Analysis Report
 Vendor Performance Reports
 Manager Performance Report
2.3.2 NON-FUNCTIONAL REQUIREMENTS
 Quality Requirement: The quality in software development process is maintained
by periodic reviews, documentation and verification at all appropriate stages. Quality
review was done at the component level and when the data components were merged
together.
 Readability: Appropriate comments in the project source code are provided to
provide readability so that the user can easily read and understand the project if need be.
So the project will be helpful for interested person. Every care is taken that the
application is functionally correct. A great degree of care has to be taken to ensure
minimum / zero defects in the code. Also if there is an error occurring then a custom
error page is made to be visible. This is done because if the user of the system sees an
error page with all details then he might get confused and close down the project. In
order to remove the fear, if any error occurs then it is redirected to custom page.
 Modularity: The project was initially divided into different modules so as to provide
easy understanding and debugging of the system. When module checking was
completed satisfactorily the modules were merged into one system.
 Modifiability: With the help of modularity and readability of the source code of the
program the system will be easy to modify in the future as and when needed.
Page 13
 Portability: The project will be easy to implement on the client system which satisfy
the minimum hardware requirements.
 Easy to Use: This project will be easy to use and so shall incorporate self-
explanatory GUI. The GUI contains the presence of tooltips and indications to navigate
properly across the system. The system is provided with a user guide that may be
accessed by the user when he faces some difficulty.
 Maintainability: The project will provide easy maintenance of the otherwise loosely
kept data which is only saved in the system but not used fruitfully. When an application
is used, it has to be maintained. There could be additional requirements in terms of
added functionality or feature. As the application is not to be maintained by the
developers, the code kept is as less complex as possible such that it can be easily
understood by the relevant person for modification. Also when new functionality was
implemented but later on was not used then that data was also kept in various versions.
If that data is also required to be implemented then that data can be taken from the
earlier versions. This can be done easily by referring to the document which contains
the details of all new additions in all the versions.
 Fault tolerance / Error Reporting: Since the application will be used by non IT
users it might be possible that operation might result into errors. The application should
provide user friendly error messages and fault tolerance facility whenever any error
occurs so that employees can understand and act in accordance. Also errors which are
not yet identified and occur then those errors are logged into the database and the user is
redirected to the same page which can be informed to the developer for further
assistance.
 Security: Since the application will be used by different users and many confidential
data will been stored it is essential that the integrity and confidentiality of the data is
maintained so that no leakage of user/vendor information take place and data remains
safe and secure. Also authentication should been provided by application which will
help to maintain only the authorized users to access and retrieve data. The allocation of
task must been kept transparent and illegal access will been denied.
2.4 DESIGN METHODOLOGY
2.4.1 WATERFALL MODEL (SOFTWARE DEVELOPMENT MODEL)
The waterfall model is also referred to as a linear-sequential life cycle model. It is very
simple to understand and use. In a waterfall model, each phase must be completed before the
next phase can begin and there is no overlapping in the phases.
Figure 3 Waterfall Model
Page 14
2.4.2 ADVANTAGES OF THE WATERFALL MODEL
The waterfall model is the oldest and most widely used model in the field of software
development. There are certain advantages of the waterfall model, which causes it to be the
most widely used model as yet. Some of them can be listed as under:
 Needless to mention, it is a linear model and of course, linear models are the most
simple to be implemented.
 The amount of resources required to implement this model is very minimal.
 One great advantage of the waterfall model is that documentation is produced at
every stage of the waterfall model development. This makes the understanding of the
product designing procedure simpler.
 After every major stage of software coding, testing is done to check the correct
running of the code.
2.4.3 WHY WE CHOSE THIS MODEL?
Every software developed is different and requires a suitable SDLC approach to be
followed based on the internal and external factors. Some situations where the use of
Waterfall model is most appropriate are:
 Requirements are very well documented, clear and fixed.
 Product definition is stable.
 Technology is understood and is not dynamic.
 There are no ambiguous requirements.
 Ample resources with required expertise are available to support the product.
We chose the waterfall model as our SDLC Process Model due to the reasons
mentioned above. The development process of our application moves from concept, through
design, implementation, testing, installation, troubleshooting, and ends up at operation and
maintenance. Each phase of development proceeds in strict order.
2.5 SYSTEM DESIGN PRINCIPLES
Object-oriented programming (OOP) is a programming paradigm that represents
concepts as "objects" that have data fields (attributes that describe the object) and associated
procedures known as methods. Objects, which are usually instances of classes, are used to
interact with one another to design applications and computer programs.
 Concepts of OOPS:
 Abstraction: Abstraction refers to the act of representing essential features without
including the background details or explanations.
 Encapsulation: It is the mechanism that binds together code and data in
manipulates, and keeps both safe from outside interference and misuse. In short, it
isolates a particular code and data from all other codes and data.
 Inheritance: It is the process by which one object acquires the properties of
another object. This supports the hierarchical classification. Without the use of
hierarchies, each object would need to define all its characteristics explicitly.
However, by use of inheritance, an object need only define those qualities that make it
unique within its class. It can inherit its general attributes from its parent. A new sub-
class inherits all of the attributes of all of its ancestors.
Page 15
 Polymorphism: Polymorphism means the ability to take more than one form. An
operation may exhibit different behaviors in different instances. The behavior depends
on the data types used in the operation.
 Why we Chose OOP?
Object-Oriented Programming has the following advantages over conventional
approaches:
 OOP provides a clear modular structure for programs which makes it good for
defining abstract data types where implementation details are hidden and the unit has
a clearly defined interface.
2.5.1 CLASS DIAGRAM
 Class Notation: Classes are used to represent objects. Objects can be anything
having properties and responsibility
 Object Notation: The object is represented in the same way as the class. The only
difference is the name which is underlined as shown below.
Page 16
Figure 4 Class Diagram
Page 17
2.5.2 USE CASE DIAGRAM
 Use case Notation: Use case is represented as an eclipse with a name inside it. It
may contain additional responsibilities.
 Actor Notation: An actor can be defined as some internal or external entity that
interacts with the system.
Page 18
Figure 5 Vendor Management Use Case Diagram
Page 19
Figure 6 Staff Management Use Case Diagram
Page 20
Figure 7 Project Announcement and Configuration Use Case Diagram
Page 21
Figure 8 Tender Bidding Use Case Diagram
Page 22
Figure 9 Project Progress Tracking Use Case Diagram
Page 23
Figure 10 Project Progress Analysis Use Case Diagram
Page 24
2.5.3 SEQUENCE DIAGRAM
 Sequence Notation: Sequence is basically message exchange between two UML
components. The following diagram represents different notations used in an
interaction.
Page 25
Figure 11 Vendor Registration Sequence Diagram
Figure 12 Tender Selection and Project Progress Analysis Sequence Diagram
Page 26
2.5.4 ACTIVITY DIAGRAM
Activity diagram is basically a flow chart to represent the flow form one activity to
another activity. The activity can be described as an operation of the system.
USE SYMBOL
Initial State
Activity
Decision
Flow of activity
Final State
Page 27
Figure 13 Vendor Management Activity Diagram
Page 28
Figure 14 Project Progress Tracking Activity Diagram
Page 29
2.5.5 DATABASE DESIGN DIAGRAM
Figure 15 Database Design Diagram
Page 30
2.5.6 ENTITY-RELATIONSHIP (ER) DIAGRAM
Entity-Relationship (ER) Diagram, a graphical representation of entities and their
relationships to each other, typically used in computing in regard to the organization
of data within databases or information systems. An entity is a piece of data-an object or
concept about which data is stored.
 There are three types of relationships between entities:
 One-to-One: One instance of an entity (A) is associated with one other instance of
another entity (B).
 One-to-Many: One instance of an entity (A) is associated with zero, one or many
instances of another entity (B), but for one instance of entity B there is only one
instance of entity A.
 Many-to-Many: One instance of an entity (A) is associated with one, zero or
many instances of another entity (B), and one instance of entity B is associated with
one, zero or many instances of Entity A.
USE SYMBOL
Ellipse represents Attributes
Diamond represents relationship between
two entities
Rectangle represents Entity
Page 31
Figure 16 Entity-Relationship (ER) Diagram
Page 32
2.5.7 STATE DIAGRAM
 Initial State Notation: Initial state is defined to show the start of a process. This
notation is used in almost all diagrams.
 Final State Notation: Final state is used to show the end of a process. This notation
is also used in almost all diagrams to describe the end.
 State machine Notation: State machine is used to describe different states of a
system component. The state can be active, idle or any other depending upon the
situation.
.
Page 33
Figure 17 State Diagram
Page 34
2.5.8 DATA DICTIONARY
Column Type Nullable Key
StaffID Int no Primary
Name Varchar[20] no -
Phone Number yes -
Email Varchar[30] no -
Address Varchar[30] no -
Department Varchar[20] no -
Username Varchar[10] no -
Password Varchar[20] no -
Designation Varchar[10] yes -
IsActive Varchar[10] no -
Table 2 Staff Data Dictionary
Column Type Nullable Key
VendorID Int No Primary
Name Varchar[20] No -
Email Varchar[30] No -
Phone Varchar[15] Yes -
Address Varchar[25] No -
Username Varchar[8] No -
Password Varchar[6] No -
Expertise Varchar[10] Yes -
IsActive Varchar[5] no -
Table 3 Vendor Data Dictionary
Column Type Nullable Key
ProjectID int no Primary
Name Varchar[20] no -
StaffID Int no Foreign
CreateDate Date no -
TenderStartDate Date no -
TenderEndDate Date no -
Status Varchar[5] no -
Description Varchar[20] yes -
Attachments Attachment no -
TermsConditions Varchar[50] yes -
SelectedBidID Int no -
StartDate Date no -
EndDate Date no -
Table 4 Project Data Dictionary
Page 35
Column Type Nullable Key
BidID Int No Primary
ProjectID Int no Foreign
VendorID Int no Foreign
Amount Int no -
TermsConditions Varchar[50] no -
BidDate Date no -
Table 5 Bid Data Dictionary
Column Type Nullable Key
MilestoneID int No Primary
ProjectID int No Foreign
PlannedDate date No -
Description Varchar[20] Yes -
CompletionDate Date No -
Photo Attachment Yes -
GPS Attachment Yes -
Timestamp Attachment Yes -
Remarks Varchar[20] Yes -
StaffID Int No Foreign
Table 6 Milestone Data Dictionary
Column Type Nullable Key
IntermediateReportID int No Primary
ProjectID int No Foreign
CompletionDate date No -
Photo attachment Yes -
GPS attachment Yes -
Timestamp attachment Yes -
Remarks Varchar[20] Yes -
StaffID int No Foreign
Table 7 Intermediate Report Data Dictionary
2.6 CANVASES ANALYSIS, DESIGN AND IMPLEMENTATION
2.6.1 OBSERVATION MATRIX
 Objectives
 Deals with Vendor, Staff and Admin
 Deals with Tendering of Different Projects
 Centralized System
 Tracking of Live Projects in Any Area
Page 36
 Scouted Challenges
 Online Tender Bidding
 Award Project Tender
 Vendor History
 Project Progress Tracking
 Project Progress Analysis Report
 Top 5 Problems on the Basis of Desirability, Feasibility and Viability
 Restricted Mobility
 Security and Backup Issues
 Live Project Tracking
 24 X 7 Availability
 Project Tender Award Via Mail (Notification)
 Final Problem (Select 1 from Top 5)
 To Provide an Efficient Way to Bid for the Announced Project Tenders as well as
Live Project Tracking with GPS and Image
Figure 18 Observation Matrix Canvas
Page 37
2.6.2 IDEATION CANVAS
 People
 Project Manager
 Administrator
 Vendor
 Web Developer
 Web Designer
 Staff
 Activities
 Vendor Registration
 Project Scheduling
 Take Image of Project Progress
 Staff Access Management
 Project Announcement
 Assign Manager
 Complete Pending Milestones
 Bidding
 Add Milestones to Project
 Analysis Report
 Situation/Context/Location
 Rainfall
 Railway/Bus Station
 Any Situation
 Hotel
 Home
 At Office
 Airport
 Props/Possible Solutions
 Project Tracking
 Vendor History
 Vendor Performance Report
 Manage Performance Report
 Mobile Application
 E-mail Notification
 24 X 7 Service
 Project Status Report
 Retrievable Data
 Resource Management
Page 38
Figure 19 Ideation Canvas
2.7 IMPLEMENTATION STRATEGY
2.7.1 MICROSOFT ASP.NET FRAMEWORK
 Introduction
 Microsoft ASP.Net or simply, .Net, is a term that has stealthily but rapidly moved
into software development nomenclature in the last few years.
 .Net is considered by many to be the next step in the Internet revolution.
 The .Net concept dates back to 1999 when it was a part of a discussion of Next
Generation Windows Services.
 Before the derivation of .Net, the acronym of choice by Microsoft was DNA –
Distributed internet Architecture.
 While .Net is immersed in this notion, it has by far surpassed its initial conception.
Page 39
 With successful promotion by Microsoft and widespread acceptance by
companies, .Net has the potential to become the standard foundation for building
powerful yet flexible Internet-centric applications.
 Why .NET?
From a paradigm where applications replicated code to provide common services, we
have moved to a paradigm where applications are built as "collaborative units" of
components working together. This simple shift has led to the collapse of the current set
of architectures and demanded a new programming model: A model where applications
can be built as reusable components and are sharable over the internet, a model that
encourages applications to be shared as a "service" (read web services) and a model that
enables true "interoperability" wherein the language used is only a matter of choice,
thus enabling organizations to take advantage of existing skill sets.
Figure 20 .NET Architecture
 Value of ASP.NET Technology
 Increased Application Reliability
 Better Performance
 Higher Level of Flexible Security
 Integration and Interoperability
 Decreased Programming Effort
 Introduction to C#
 It is important to interview C# not in isolation but as an integral part of the entire
.NET framework.
 .NET represents not only a revolution in facilities available for general-purpose
Windows programming, but it will also be the immediate environment seen by your
.NET code (more properly known as managed code) when it runs.
 .NET brings about many benefits, including the easy-to-use object model, the
garbage collection mechanism for automatically cleaning up resources, and far
improved libraries covering areas ranging from Windows GUI support to data access
and generating ASP.NET pages.
Page 40
 Advantages of C#
 C# Supports COM (Component Object Model) and DCOM (Distributed
Component Object Model) applications.
 C# is fully Object Oriented Programming Language.
 C# supports language interoperability.
2.7.2 ANDRIOD
Android is an operating system based on the Linux kernel, and designed primarily
for touch screen mobile devices such as smart phones and tablet computers. Initially
developed by Android Inc. which Google backed financially and later bought in
2005. Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a
consortium of hardware, software, and telecommunication companies devoted to
advancing open standards for mobile devices. The first Android phone (HTC Dream) was
sold in October 2008.
The user interface of Android is based on direct manipulation, using touch inputs that
loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching
to manipulate on-screen objects. Internal hardware such
as accelerometers, gyroscopes and proximity sensors are used by some applications to
respond to additional user actions, for example adjusting the screen from portrait to landscape
depending on how the device is oriented. Android allows users to customize their home
screens with shortcuts to applications and widgets, which allow users to display live content,
such as emails and weather information, directly on the home screen. Applications can
further send notifications to the user to inform them of relevant information, such as new
emails and text messages.
Android is the world's most widely used smartphone platform, overtaking Symbian in
the fourth quarter of 2010 Android is popular with technology companies who require a
ready-made, low-cost, customizable and lightweight operating system for high tech devices.
Despite being primarily designed for phones and tablets, it also has been used in televisions,
digital cameras and other electronics. The user interface of Android is based on direct
manipulation, using touch inputs that loosely correspond to real-world actions, like swiping,
tapping, pinching and reverse pinching to manipulate on-screen objects.
Figure 21 Android Architecture
Page 41
Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
by some applications to respond to additional user actions.
Android allows users to customize their home screens with shortcuts to applications and
widgets, which allow users to display live content, such as emails and weather information,
directly on the home screen.
2.7.3 IMPLEMENTATION ENVIRONMENT (PHASE IMPLEMENTATION)
Single Vs Multi-User, GUI Vs Non-GUI: Without a solid implementation plan executed
by an experienced team, even good software will probably fail to meet expectations. Only
when the implementation team has gone through a similar process within a construction
company can the experience be complete.
First-hand familiarity with the general workflow requirements of a construction
business prepares the team to better guide the customer through a phased implementation
process designed to save the company time and money. Our implementation methodology is
phased Implementation.
Phased implementation is a changeover process that takes place in stages. In our system
implementation, firstly the system will handle certain small and less risky projects and other
projects will be handled using old system. So that if the system fails risk can be minimized.
Once system is working properly then the old system can be replaced with new system. The
phased operation changeover method involves implementing the new system in stages, or
modules. We can implement each subsystem by using any of the other three changeover
methods. In this approach risk of errors or failures is limited to the implemented module only
as well as it is less expensive than the full parallel operation.
As the system, which we are implementing, involves various phased operation like live
tracking, online bidding, project announcements, and etc. so it can cost more than the pilot
approach.
Figure 22 Phase Implementation Environment
Page 42
CHAPTER 3 IMPLEMENTATION
3.1 SCREENSHOTS/USER INTERFACE DESIGN
Figure 23 Sign Up for Vendor
Figure 24 Sign Up Validation Parameters for Vendor
Page 43
Figure 25 Sign In for Vendor, Admin and Staff
Figure 26 Password Recovery
Page 44
Figure 27 Dashboard (Admin Side)
Figure 28 List of Accepted or Awarded Projects (Vendor Side)
Page 45
Figure 29 Project Search (Admin Side)
Figure 30 Project Detail (Admin Side)
Page 46
Figure 31 Project Detail Validation Parameters (Admin Side)
Figure 32 Vendor Search (Admin Side)
Page 47
Figure 33 Edit Vendor Details (Admin Side)
Figure 34 Staff Search (Admin Side)
Page 48
Figure 35 Bid Selection (Admin Side)
Figure 36 Selected Bid (Admin Side)
Page 49
Figure 37 Milestones (Admin Side)
Figure 38 Form for Declaring of New Milestone (Admin Side)
Page 50
Figure 39 Milestone Detail Received from Android Application Sample 1 (Admin Side)
Figure 40 Milestone Detail Received from Android Application Sample 2 (Admin Side)
Page 51
Figure 41 Intermediate Reports (Admin Side)
Figure 42 Intermediate Report Detail Received from Android Application (Admin Side)
Page 52
Figure 43 Map Showing Location and GPS Coordinates (Admin Side)
Figure 44 List of Bids Placed on Various Projects (Vendor Side)
Page 53
Figure 45 Contact Us (Vendor Side)
Figure 46 Assigned Projects (Staff Side)
Page 54
Figure 47 Sign In for Staff (Android Application)
Figure 48 Assigned Projects (Android Application)
Page 55
Figure 49 Assigned Milestones (Android Application)
Figure 50 Form to Fill Milestone Detail (Android Application)
Page 56
3.2 TESTING PLAN
Throughout the lifecycle of the system development, we consider some of the Testing
principles in our mind before applying methods to design effective test cases, which are:
 Tests should be planned before testing begins. Test planning can begin as
soon as the coding phase is complete.
 The Pareto principle applies to software testing. The Pareto principle implies
that 80 percent of all errors uncovered during testing will likely be traceable to
20 percent of all program modules. The problem of course, is to isolate these
suspect modules and to thoroughly test them.
 Testing should begin “in the small” and progress toward testing “in the
large”.
 The first tests planned and executed generally focus on individual program
modules. As testing progresses, testing shifts focus in an attempt to find errors in
integrated clusters of modules and ultimately in the entire system.
3.2.1 TESTING STRATEGY
Strategies of software testing used in the project:
 Black Box Testing:
Black box testing focuses on the functional requirements of the software .that is
black box testing enables the software engineer to derive set of input conditions that
will fully exercise all the functional requirements for the program, it uncovers different
class of errors than the white box ones.
Black box testing attempts to find out errors in the following categories and that’s the
reason why we chose it:
 Incorrect or missing functions.
 Interface errors
 Errors in data structures or external database access
 Behavior or performance errors
 Initialization and termination errors
 White Box Testing:
Logical paths through the software are tested by providing test cases that exercise
specific sets of conditions and loops. It uses control structures of the procedural design
to derive test case. Using White Box testing methods, the software engineer can derive
test cases that provide features as mentioned; this is the reason why we chose it. The
Software engineer can derive test case that:
 Assured exercise of all independent paths in a module at least once.
 Exercise all the logical decision on the true and false sides.
 Execute all the loops at their boundaries & within their operational
bounds.
Page 57
3.2.2 TEST VALUES/CASES
No. Test Case Input
Expected
Output
Actual
Output
Remark
1
Trying to log in
with null values
Username and
password with
null values
Invalid
username and
password
Invalid
username or
password
Passed
2
Login with
invalid username
and password
Invalid username
or password
Invalid
username or
password
Invalid
username or
password
Passed
3
Login with valid
username and
password
Valid username
and password
Valid
username and
password
Valid
username and
password
Passed
4
Designated rights
on login
Username and
password
Proper rights
Proper rights
were given
Passed
5
Project Search
by status
Pending or
Awarded or
Completed or
All
List according
to selected
status
List according
to selected
status
Passed
6
Announcing
project with
empty name field
Null value
Name is
required
Name is
required
Passed
7
Announcing
project with
proper value in
name field
Non null
value/value
entered in name
field
Name is
accepted
Name is
accepted
Passed
8
Announcing
project with
empty Date
fields.
Null Values
Date fields are
to be filled
Date is
required
Passed
Page 58
9
Announcing
project with
proper value in
date field
Proper value in
DD-MM-YYYY
format
Date is
accepted
Date is
accepted
Passed
10
Creating Vendor
account with null
value in required
fields
Null values
Fields are
required
Fields are
required
Passed
11
Creating vendor
account with
alphanumeric
mobile number
Alphanumeric
values
Invalid Phone
number
Invalid phone
number
Passed
12
Creating vendor
account with
numeric mobile
number
Numeric values
Phone number
accepted
Phone
number
accepted
Passed
13
Creating vendor
account without
email format
Values without
following email
format
Email not
valid
Email not
valid
Passed
14
Creating vendor
account with
email format
Values following
email format
Email
accepted
Email
accepted
Passed
15
Creating vendor
account with
different
password and
confirmation
password
Different values
in password and
confirm
password
Password does
not match
Password
does not
match
Passed
16
Creating staff
account with null
value in required
fields
Null values
Fields are
required
Fields are
required
Passed
17
Creating staff
account with
alphanumeric
mobile number
Alphanumeric
values
Invalid Phone
number
Invalid Phone
number
Passed
Page 59
18
Creating staff
account with
mobile number
Numeric values
Phone number
accepted
Phone
number
accepted
Passed
19
Creating staff
account without
email format
Values without
following email
format
Email not
valid
Email not
valid
Passed
20
Creating staff
account with
email format
Values following
email format
Email
accepted
Email
accepted
Passed
21
Creating staff
account with
different
password and
confirmation
password
Different values
in password and
confirm
password
Password does
not match
Password
does not
match
Passed
22
Add milestone to
project without
required fields
Null value
Field is
required
Field is
required
Passed
23
Add milestone to
project with
required fields
Proper value
Milestone
added
Milestone
added
Passed
24
View milestone-
admin
View milestone
Milestone data
viewed
Milestone
data viewed
Passed
25
Change
milestone -admin
Change
milestone
Milestone
changed
Milestone
changed
Passed
26
View bids of all
vendors for
specific project -
admin
View bids Bids viewed Bids viewed Passed
Page 60
27
Select bid for
specific project -
admin
Select bid Bid accepted Bid accepted Passed
28
View selected
bid -admin
View selected
bid
Selected bid
viewed
Selected bid
viewed
Passed
29
View all pending
projects
View projects Project viewed
Project
viewed
Passed
30
Submit bid form
with null values
Null values
Field is
required
Field is
required
Passed
31
Submit bid form
with proper
values
Proper values
Bid form
submitted
Bid form
submitted
Passed
32
View accepted
projects -vendor
View projects
Projects
viewed
Project
viewed
Passed
33
View bid details
-vendor
View bid Bid viewed Bid viewed
Passed
34
View milestones
-vendor
View milestones
Milestones
viewed
Milestones
viewed
Passed
35
View bid history
-vendor
View bid
Bid history
viewed
Bid history
viewed
Passed
Page 61
36
Staff login from
android app with
null values
Username and
password with
null values
Invalid
username and
password
Invalid
username and
password
Passed
37
Staff login from
android app with
invalid username
or password
Invalid username
or password
Invalid
username or
password
Invalid
username or
password
Passed
38
Staff login from
android app with
valid username
or password
Valid username
and password
Valid
username and
password
Valid
username and
password
Passed
39 Send report Send report
Report
submitted
Report
submitted
Passed
Table 8 Test Values/Cases
Page 62
CHAPTER 4
SUMMARY OF THE RESULTS AND CONCLUSION
4.1 SUMMARY OF THE RESULTS
 Our system will provide complete tendering and tracking services using the latest
equipment and technology to facilitate the admin and vendor to manage the different
projects at different area at different time. The company's products and services show
that we are an innovative, forward thinking company that recognizes the need to move
with ever-changing vendors needs. A realization that effective communication is a key
component in our business; we developed an android application that performs tracking
work. The company also realizes that, in a competitive environment, flexibility and
efficiency maintain that leading edge.
 The company has staff that is fully trained on the use of the computer system and
android phones/smartphone. As an added verification measure for both vendors and
admin, tracking android applications provides Global Positioning Systems (GPS) and
image, which enable the admin to track the progress of awarded projects.
 The company's strategy is to build reputation and market share by establishing our
business offering as a viable alternative to existing methodology.
 It provides a great deal of information about project announced in a very interactive
way. It is a one stop shop for tendering and tracking providing a variety of information at
one click.
 It also provides user with information search bar, where one can search any relevant
project.
4.2 USEFULNESS WITH RESPECT TO EXISTING SOLUTION
As we know, there is already MGVCL website for this purpose. Our system will work
same as their system but there are many differences between our system and their system
including android application which is for tracking purpose also the online bidding is the new
concept. Online project announcing is provided by the current system but Projects are not
awarded which is provided by our system and that makes our system useful with respect to
existing solution.
4.3 LIMITATIONS OF OUR SYSTEM
Limitations of our system are:
 Our system requires high bandwidth rate. The internet connection should be reliable.
 The system requires a large database to store the contents like Photographs from
android device.
 As android devices are used for tracking mechanism the cost investment behind our
system will be required more.
Page 63
4.4 FUTURE ENHANCEMENT
The Future scope of our system is:
 An android application with better GUI can be made at the later stages.
 More validation can be provided to the android application.
 Video Conference between authorities and vendor or authorities and staff can be made
possible at the later phase.
4.5 CONCLUSION
Hereby, we conclude that our system will be helpful to each and every vendor that is
interested to work with MGVCL on different projects.
By implementing this system, everyone i.e. admin and vendor can have 24x7 hours
quick, safe, easiest, convenient and accurate access to the web application through which they
can know about the project progress easily. Also, MGVCL will get effective verified results
on project progress due to Android tracking application. Thus, altogether this system will be
useful in each aspect i.e. tendering and tracking and will provide efficient performance which
will ease the management of various projects by vendor and admin.
Page 64
REFERENCES
 Advance .NET Technology- By Dreamtech Publications
 Asp.Net 2.0 Black Book
 Asp.Net: The Complete Reference By Matthew Macdonald Published By McGraw Hill
Education (India) Private Limited
 asp.net-tutorials.com.
 Beginning Android Application Development By wei meng lee Published By Wiley India
Pvt Ltd
 http://www.mgvcl.com/
 Programming Android By O’riley publication
 Software Engineering - Roger S Pressman [5th edition]
 The Complete Reference Asp.Net by Robert Standefer III for Asp.Net
 www.conceptdraw.com
 www.freepatentonline.com
 www.google.co.in
 www.Ipindiaonline.gov.in
 www.samaysoftware.com
 www.stackoverflow.com
 www.tutorialspoint.com
 www.w3schools.com/aspnet
 www.wikipedia.com
 www.yoututbe.com
APPENDIX I
PERIODIC PROGRESS REPORTS
 First 4 PPRs By Achal Patel (110410107016)
 Second 4 PPRs By Krunal Patel (1104010107004)
 Third 4 PPRs By Devang Mistry (110410107063)
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT
Final Report PTAT

Weitere ähnliche Inhalte

Was ist angesagt?

online examination management system
online examination management systemonline examination management system
online examination management systemPraveen Patel
 
Job portal project documentary
Job portal project documentaryJob portal project documentary
Job portal project documentaryUmang_jain
 
18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru
18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru
18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, MysuruNithin Kumar,VVCE, Mysuru
 
IRJET- Design and Development of Web Application for Student Placement Tr...
IRJET-  	  Design and Development of Web Application for Student Placement Tr...IRJET-  	  Design and Development of Web Application for Student Placement Tr...
IRJET- Design and Development of Web Application for Student Placement Tr...IRJET Journal
 
online quiz application project presentation
online quiz application project presentationonline quiz application project presentation
online quiz application project presentationGyanuRana
 
Astha ppt
Astha pptAstha ppt
Astha pptjaini28
 
online job portal system
online job portal systemonline job portal system
online job portal systemKrishna Ranjan
 
Virtual Job Portal System
Virtual Job Portal SystemVirtual Job Portal System
Virtual Job Portal SystemTAWSEEF AHMAD
 
Open source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment systemOpen source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment systemArjun Rajeswaran
 
Database Website on Django
Database Website on DjangoDatabase Website on Django
Database Website on DjangoHamdaAnees
 
Online Exam System_Industrial Report
Online Exam System_Industrial ReportOnline Exam System_Industrial Report
Online Exam System_Industrial ReportManmeet Sinha
 
Design and Implementation of an Automated Personnel Recruitment System
Design and Implementation of an AutomatedPersonnel Recruitment System Design and Implementation of an AutomatedPersonnel Recruitment System
Design and Implementation of an Automated Personnel Recruitment System Nathalia Kharisma Sari
 
Varatharaj_Android
Varatharaj_AndroidVaratharaj_Android
Varatharaj_AndroidVaratharaj E
 

Was ist angesagt? (20)

Online Job Portal
Online Job PortalOnline Job Portal
Online Job Portal
 
online examination management system
online examination management systemonline examination management system
online examination management system
 
Job portal project documentary
Job portal project documentaryJob portal project documentary
Job portal project documentary
 
Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)
 
18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru
18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru
18CSMP68 VTU Mobile Application Develeopment Lab Manual by Nithin, VVCE, Mysuru
 
5 job adda doc 2
5 job adda doc 25 job adda doc 2
5 job adda doc 2
 
IRJET- Design and Development of Web Application for Student Placement Tr...
IRJET-  	  Design and Development of Web Application for Student Placement Tr...IRJET-  	  Design and Development of Web Application for Student Placement Tr...
IRJET- Design and Development of Web Application for Student Placement Tr...
 
online quiz application project presentation
online quiz application project presentationonline quiz application project presentation
online quiz application project presentation
 
Car centralize
Car centralizeCar centralize
Car centralize
 
Astha ppt
Astha pptAstha ppt
Astha ppt
 
Internship report
Internship reportInternship report
Internship report
 
online job portal system
online job portal systemonline job portal system
online job portal system
 
Virtual Job Portal System
Virtual Job Portal SystemVirtual Job Portal System
Virtual Job Portal System
 
Open source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment systemOpen source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment system
 
Hotel management report
Hotel management reportHotel management report
Hotel management report
 
CHANDRA SHEKHAR MANJHI_Resume
CHANDRA SHEKHAR MANJHI_ResumeCHANDRA SHEKHAR MANJHI_Resume
CHANDRA SHEKHAR MANJHI_Resume
 
Database Website on Django
Database Website on DjangoDatabase Website on Django
Database Website on Django
 
Online Exam System_Industrial Report
Online Exam System_Industrial ReportOnline Exam System_Industrial Report
Online Exam System_Industrial Report
 
Design and Implementation of an Automated Personnel Recruitment System
Design and Implementation of an AutomatedPersonnel Recruitment System Design and Implementation of an AutomatedPersonnel Recruitment System
Design and Implementation of an Automated Personnel Recruitment System
 
Varatharaj_Android
Varatharaj_AndroidVaratharaj_Android
Varatharaj_Android
 

Andere mochten auch

E-Tender System
E-Tender SystemE-Tender System
E-Tender SystemSmit Patel
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
 
Baby Car Rf Id Solution 2
Baby Car Rf Id Solution 2Baby Car Rf Id Solution 2
Baby Car Rf Id Solution 2Ismail Ibrahim
 
A Bidding System In Football "Football Fantasy"
A Bidding System In Football "Football Fantasy" A Bidding System In Football "Football Fantasy"
A Bidding System In Football "Football Fantasy" Anit Thapaliya
 
Facebook Success: 7 Strategies for Nonprofits
Facebook Success: 7 Strategies for NonprofitsFacebook Success: 7 Strategies for Nonprofits
Facebook Success: 7 Strategies for NonprofitsHubSpot
 
207095812 supply-chain-management
207095812 supply-chain-management207095812 supply-chain-management
207095812 supply-chain-managementhomeworkping7
 
WebRTC + Socket.io: building a skype-like video chat with native javascript
WebRTC + Socket.io: building a skype-like video chat with native javascriptWebRTC + Socket.io: building a skype-like video chat with native javascript
WebRTC + Socket.io: building a skype-like video chat with native javascriptMichele Di Salvatore
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
Bus tracking application project report
Bus tracking application project reportBus tracking application project report
Bus tracking application project reportAbhishek Singh
 
Data Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case DiagramData Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case DiagramKumar
 
Blood Bank Management System (including UML diagrams)
Blood Bank Management System (including UML diagrams)Blood Bank Management System (including UML diagrams)
Blood Bank Management System (including UML diagrams)Harshil Darji
 
Uml diagrams
Uml diagramsUml diagrams
Uml diagramsbarney92
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Dinesh Jogdand
 
Plantas de tratamiento de agua potable
Plantas de tratamiento de agua potablePlantas de tratamiento de agua potable
Plantas de tratamiento de agua potableMiguel Contreras Ortiz
 

Andere mochten auch (20)

E-Tender System
E-Tender SystemE-Tender System
E-Tender System
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Baby Car Rf Id Solution 2
Baby Car Rf Id Solution 2Baby Car Rf Id Solution 2
Baby Car Rf Id Solution 2
 
Job center
Job centerJob center
Job center
 
A Bidding System In Football "Football Fantasy"
A Bidding System In Football "Football Fantasy" A Bidding System In Football "Football Fantasy"
A Bidding System In Football "Football Fantasy"
 
Facebook Success: 7 Strategies for Nonprofits
Facebook Success: 7 Strategies for NonprofitsFacebook Success: 7 Strategies for Nonprofits
Facebook Success: 7 Strategies for Nonprofits
 
Case Tools
Case ToolsCase Tools
Case Tools
 
207095812 supply-chain-management
207095812 supply-chain-management207095812 supply-chain-management
207095812 supply-chain-management
 
Report Sahil
Report SahilReport Sahil
Report Sahil
 
Use case diagrams
Use case diagramsUse case diagrams
Use case diagrams
 
WebRTC + Socket.io: building a skype-like video chat with native javascript
WebRTC + Socket.io: building a skype-like video chat with native javascriptWebRTC + Socket.io: building a skype-like video chat with native javascript
WebRTC + Socket.io: building a skype-like video chat with native javascript
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
Bus tracking application project report
Bus tracking application project reportBus tracking application project report
Bus tracking application project report
 
Data Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case DiagramData Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case Diagram
 
Blood Bank Management System (including UML diagrams)
Blood Bank Management System (including UML diagrams)Blood Bank Management System (including UML diagrams)
Blood Bank Management System (including UML diagrams)
 
What Is Plagiarism
What Is PlagiarismWhat Is Plagiarism
What Is Plagiarism
 
Uml diagrams
Uml diagramsUml diagrams
Uml diagrams
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)
 
Plantas de tratamiento de agua potable
Plantas de tratamiento de agua potablePlantas de tratamiento de agua potable
Plantas de tratamiento de agua potable
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
 

Ähnlich wie Final Report PTAT

Full UnderGrad Project Report : Tender Timeline Tracker
Full UnderGrad Project Report : Tender Timeline TrackerFull UnderGrad Project Report : Tender Timeline Tracker
Full UnderGrad Project Report : Tender Timeline TrackerPallav Shah
 
FINAL REPORT DEC
FINAL REPORT DECFINAL REPORT DEC
FINAL REPORT DECAxis Bank
 
TECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHITECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHIJuhi Sharma
 
Agile4 com method-uk_v3.675
Agile4 com method-uk_v3.675Agile4 com method-uk_v3.675
Agile4 com method-uk_v3.675all2com
 
CV_Sunil Arya_Updated
CV_Sunil Arya_UpdatedCV_Sunil Arya_Updated
CV_Sunil Arya_UpdatedSunil Arya
 
Project Report Online Test
Project Report Online TestProject Report Online Test
Project Report Online TestAbhishek Kumar
 
Assesmment System - project report
Assesmment System - project reportAssesmment System - project report
Assesmment System - project reportArpit Pandya
 
Minor project report format for 2018 2019 final
Minor project report format for 2018 2019 finalMinor project report format for 2018 2019 final
Minor project report format for 2018 2019 finalShrikantkumar21
 
AMIZONER: Final Report
AMIZONER: Final ReportAMIZONER: Final Report
AMIZONER: Final ReportNeil Mathew
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentationWakimul Alam
 
IRJET - Automated Exam Cell System
IRJET - Automated Exam Cell SystemIRJET - Automated Exam Cell System
IRJET - Automated Exam Cell SystemIRJET Journal
 
Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Harsh Verma
 
online test system project report
online test system project reportonline test system project report
online test system project reportabhishek kumar
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.Manoj Kumar
 
G+20 Corporate House Construction & Project Management.
G+20 Corporate House Construction & Project Management.G+20 Corporate House Construction & Project Management.
G+20 Corporate House Construction & Project Management.Neelay Khese
 
HPH Project Report
HPH Project ReportHPH Project Report
HPH Project ReportMehul Jain
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerSai Chandra Chittuluri
 

Ähnlich wie Final Report PTAT (20)

Full UnderGrad Project Report : Tender Timeline Tracker
Full UnderGrad Project Report : Tender Timeline TrackerFull UnderGrad Project Report : Tender Timeline Tracker
Full UnderGrad Project Report : Tender Timeline Tracker
 
FINAL REPORT DEC
FINAL REPORT DECFINAL REPORT DEC
FINAL REPORT DEC
 
Online cet
Online cetOnline cet
Online cet
 
TECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHITECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHI
 
Agile4 com method-uk_v3.675
Agile4 com method-uk_v3.675Agile4 com method-uk_v3.675
Agile4 com method-uk_v3.675
 
CV_Sunil Arya_Updated
CV_Sunil Arya_UpdatedCV_Sunil Arya_Updated
CV_Sunil Arya_Updated
 
Project Report Online Test
Project Report Online TestProject Report Online Test
Project Report Online Test
 
Assesmment System - project report
Assesmment System - project reportAssesmment System - project report
Assesmment System - project report
 
Minor project report format for 2018 2019 final
Minor project report format for 2018 2019 finalMinor project report format for 2018 2019 final
Minor project report format for 2018 2019 final
 
AMIZONER: Final Report
AMIZONER: Final ReportAMIZONER: Final Report
AMIZONER: Final Report
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentation
 
IRJET - Automated Exam Cell System
IRJET - Automated Exam Cell SystemIRJET - Automated Exam Cell System
IRJET - Automated Exam Cell System
 
Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"
 
online test system project report
online test system project reportonline test system project report
online test system project report
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
G+20 Corporate House Construction & Project Management.
G+20 Corporate House Construction & Project Management.G+20 Corporate House Construction & Project Management.
G+20 Corporate House Construction & Project Management.
 
Groom Auto Project
Groom Auto ProjectGroom Auto Project
Groom Auto Project
 
Project Report
Project ReportProject Report
Project Report
 
HPH Project Report
HPH Project ReportHPH Project Report
HPH Project Report
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
 

Final Report PTAT

  • 1. PROJECT TENDERING AND TRACKING APPLICATION PROJECT TYPE: IDP A PROJECT REPORT Submitted by: DEVANG MISTRY [110410107063] KRUNAL PATEL [110410107004] ACHAL PATEL [110410107016] NAME OF THE INDUSTRY: MGVCL Guided by: Industry Guide: Internal Guide: C N Pendor Barkha M Joshi Superintending Engineer, MGVCL Assistant Professor, SVIT In fulfillment for the award of the degree of BACHELOR OF ENGINEERING in COMPUTER ENGINEERING SARDAR VALLABHBHAI PATEL INSTITUTE OF TECHNOLOGY, VASAD Gujarat Technological University, Ahmedabad May, 2015
  • 2. SARDAR VALLABHBHAI PATEL INSTITUTE OF TECHNOLOGY, VASAD Computer Engineering 2015 CERTIFICATE Date: This is to certify that the project entitled “Project Tendering And Tracking Application” has been carried out by Krunal Patel (110410107004) , Devang Mistry(110410107063) and Achal Patel(110410107016) under my guidance in fulfillment of the degree of Bachelor of Engineering in Department of Computer Engineering (8th Semester) of Gujarat Technological University, Ahmedabad during the academic year 2014-15. Internal Guide: Head of Department: Prof. Barkha M Joshi Prof. Bijal J.Talati Assistant Professor, Head of the Department, C.E. Department C.E. Department S.V.I.T., Vasad S.V.I.T., Vasad
  • 6. GUJARAT TECHNOLOGICAL UNIVERSITY CERTIFICATE FOR COMPLETION OF ALL ACTIVITIES AT ONLINE PROJECT PORTAL B.E. SEMESTER VIII, ACADEMIC YEAR 2014-2015 Date of certificate generation : 20 May 2015 (13:17) Plagiarism Search Report Final Project Report Patent Drafting Exercise (PDE) Business Model Canvas (Report) Business Model Canvas (Image) Submitted Four Periodic Progress Reports (PPR) Uploaded Uploaded Completed Uploaded Uploaded Completed This is to certify that, Achal Ghanshyambhai Patel (Enrolment Number-110410107016) working on project entitled with Project Tendering And Tracking System from Computer Engineering department of Sardar Vallabhbhai Patel Institute Of Technology, Vasad had submitted following details at online project portal. Name of Student : Signature of Student : Achal Ghanshyambhai Patel *Signature of Guide : Name of Guide : Ms. Barkha Malay Joshi This is a computer generated copy and does not indicate that your data has been evaluated. This is the receipt that GTU has received a copy of the data that you have uploaded and submitted as your project work. Disclaimer : *Guide has to sign the certificate, Only if all above activities has been Completed / Uploaded.
  • 7. GUJARAT TECHNOLOGICAL UNIVERSITY CERTIFICATE FOR COMPLETION OF ALL ACTIVITIES AT ONLINE PROJECT PORTAL B.E. SEMESTER VIII, ACADEMIC YEAR 2014-2015 Date of certificate generation : 21 May 2015 ( 0:03) Plagiarism Search Report Final Project Report Patent Drafting Exercise (PDE) Business Model Canvas (Report) Business Model Canvas (Image) Submitted Four Periodic Progress Reports (PPR) Uploaded Uploaded Completed Uploaded Uploaded Completed This is to certify that, Devang Devendrakumar Mistry (Enrolment Number-110410107063) working on project entitled with Project Tendering And Tracking System from Computer Engineering department of Sardar Vallabhbhai Patel Institute Of Technology, Vasad had submitted following details at online project portal. Name of Student : Signature of Student : Devang Devendrakumar Mistry *Signature of Guide : Name of Guide : Ms. Barkha Malay Joshi This is a computer generated copy and does not indicate that your data has been evaluated. This is the receipt that GTU has received a copy of the data that you have uploaded and submitted as your project work. Disclaimer : *Guide has to sign the certificate, Only if all above activities has been Completed / Uploaded.
  • 8. GUJARAT TECHNOLOGICAL UNIVERSITY CERTIFICATE FOR COMPLETION OF ALL ACTIVITIES AT ONLINE PROJECT PORTAL B.E. SEMESTER VIII, ACADEMIC YEAR 2014-2015 Date of certificate generation : 20 May 2015 (23:47) Plagiarism Search Report Final Project Report Patent Drafting Exercise (PDE) Business Model Canvas (Report) Business Model Canvas (Image) Submitted Four Periodic Progress Reports (PPR) Uploaded Uploaded Completed Uploaded Uploaded Completed This is to certify that, Krunal Ashwinkumar Patel (Enrolment Number-110410107004) working on project entitled with Project Tendering And Tracking System from Computer Engineering department of Sardar Vallabhbhai Patel Institute Of Technology, Vasad had submitted following details at online project portal. Name of Student : Signature of Student : Krunal Ashwinkumar Patel *Signature of Guide : Name of Guide : Ms. Barkha Malay Joshi This is a computer generated copy and does not indicate that your data has been evaluated. This is the receipt that GTU has received a copy of the data that you have uploaded and submitted as your project work. Disclaimer : *Guide has to sign the certificate, Only if all above activities has been Completed / Uploaded.
  • 9. PLAGIARISM REPORT/CERTIFICATE www.plagiarism-detect.com Date: 20.5.2015 Words: 10470 Plagiarised sources: 147 Plagiarised: 3% http://en.wikipedia.org/wiki/Feasibility_study plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic 2. their applicability to the expected needs of the proposed 3. Typically this means estimating how long the system will 4. to develop, and if it can be completed 5. a given time period using some methods like payback http://www.slideshare.net/MRIGANKAMANDAL/feasibility-report-29350738 plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic 2. their applicability to the expected needs of the proposed 3. Typically this means estimating how long the system will 4. to develop, and if it can be completed 5. a given time period using some methods like payback http://www.academia.edu/8021930/Any_Housing_Scheme_Undertaken_without_Feasibility_Studies_Cannot_suc ceed_Preparation_for_economic plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic 2. their applicability to the expected needs of the proposed 3. Typically this means estimating how long the system will 4. to develop, and if it can be completed 5. a given time period using some methods like payback http://www.essay.uk.com/free-essays/information-technology/smile-farm-e-revolution-farmers.php plagiarised from source: >1% 1. manipulate information then system get re-configure and user get configuration 2. requires regular maintenance so it won’t 3. failure and we can prevent data 4. When a team member knows that he will be unable to http://www.slideshare.net/emperorofghostkumar12/computer-application-project-on plagiarised from source: >1% 1. approach to be followed based on the internal and external 2. Some situations where the use of Waterfall model is most appropriate are 3. are very well documented, clear and fixed. Product definition is stable. Technology 4. implementation, testing, installation, troubleshooting, and ends up at operation and http://tutsdaddy.com/what-is-android.html plagiarised from source: >1% 1. swiping, tapping, pinching and reverse pinching to manipulate on-screen 2. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used
  • 10. 3. customize their home screens with shortcuts to applications and widgets 4. allow users to display live content, such as emails and http://www.slideshare.net/sureshca505/sdlc-tutorial plagiarised from source: >1% 1. approach to be followed based on the internal and external 2. Some situations where the use of Waterfall model is most appropriate are 3. implementation, testing, installation, troubleshooting, and ends up at operation and http://www.academia.edu/6722998/STEPS_INVOLVED_IN_SYSTEM_ANALYSIS_AND_DESIGN_LIFE_CYCLE_O F_SYSTEMSANALYSIS_AND_DESIGN plagiarised from source: >1% 1. Typically this means estimating how long the system will 2. to develop, and if it can be completed 3. a given time period using some methods like payback http://www.tutorialspoint.com/sdlc/sdlc_waterfall_model.htm plagiarised from source: >1% 1. approach to be followed based on the internal and external 2. Some situations where the use of Waterfall model is most appropriate are 3. implementation, testing, installation, troubleshooting, and ends up at operation and http://itsabacus.com/android/ plagiarised from source: >1% 1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used 2. customize their home screens with shortcuts to applications and widgets 3. allow users to display live content, such as emails and http://www.slideshare.net/MuhammadUsman19/android-media-player-project-proposal plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch 2. customize their home screens with shortcuts to applications and widgets 3. allow users to display live content, such as emails and http://en.wikipedia.org/wiki/Android_(operating_system) plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding 2. the Open Handset Alliance: a consortium of hardware, software 3. swiping, tapping, pinching and reverse pinching to manipulate on-screen http://www.slideshare.net/abisek123/final-report-internavisek-signed plagiarised from source: >1% 1. Typically this means estimating how long the system will 2. to develop, and if it can be completed 3. a given time period using some methods like payback http://www.slideshare.net/Dishaan/android-ppt-36511838 plagiarised from source: >1% 1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used 2. customize their home screens with shortcuts to applications and widgets 3. allow users to display live content, such as emails and http://www.academia.edu/6409654/OBJECT_ORIENTED_PROGRAMMING_PRINCIPLES plagiarised from source: >1%
  • 11. 1. that describe the object) and associated procedures known as 2. interact with one another to design applications and computer programs http://www.macs.hw.ac.uk/~rs46/posts/2014-02-03-objects-boxes-actors-agents.html plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. interact with one another to design applications and computer programs http://jaider.net/key-concepts/ plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. that describe the object) and associated procedures known as http://www.quora.com/What-are-some-facts-about-coding-in-the-Java-programming-language-that-every-compu ter-student-should-know plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. that describe the object) and associated procedures known as https://msritse2012.wordpress.com/2013/01/29/unit-3-programming-paradigm-kishore-k/ plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. interact with one another to design applications and computer programs http://simpledeveloper.com/object-oriented-programming-in-php-part-i/ plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. that describe the object) and associated procedures known as http://coddicted.com/oops-concepts/ plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. that describe the object) and associated procedures known as http://w3guy.com/books-learn-php-object-oriented-programing/ plagiarised from source: >1% 1. that describe the object) and associated procedures known as 2. interact with one another to design applications and computer programs http://www.slideshare.net/khannabwn/150-17280879 plagiarised from source: >1% 1. Typically this means estimating how long the system will 2. to develop, and if it can be completed https://www.weheartswift.com/object-oriented-programming-swift/ plagiarised from source: >1% 1. that describe the object) and associated procedures known as 2. interact with one another to design applications and computer programs http://www.slideshare.net/Girase123rakesh/main-zota-abstract plagiarised from source: >1% 1. with a brief study of different hardware used in the computerized 2. All the hardware needed here are generally
  • 12. http://www.codeproject.com/Articles/27775/Object-Oriented-Programming-Concepts plagiarised from source: >1% 1. data from all other codes and 2. those qualities that make it unique within its http://www.slideshare.net/rupenparte/database-management-systems-40150526 plagiarised from source: >1% 1. entity B there is only one instance of entity 2. associated with one, zero or many instances of another http://help.bizagi.com/bpmsuite/en/relationship_types.htm plagiarised from source: >1% 1. entity B there is only one instance of entity 2. associated with one, zero or many instances of another http://www.webopedia.com/TERM/E/entity_relationship_diagram.html plagiarised from source: >1% 1. entity B there is only one instance of entity 2. associated with one, zero or many instances of another http://www.slideshare.net/tusharsoni58/college-stationery-management-system-45146236 plagiarised from source: >1% 1. Typically this means estimating how long the system will 2. to develop, and if it can be completed http://www.infobridgesolutions.com/technicalshowcase/android plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding 2. the Open Handset Alliance: a consortium of hardware, software http://www.cloudiply.com/services/mobileapplications plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding 2. the Open Handset Alliance: a consortium of hardware, software http://devoops.me/themes/devoops/ajax/ui_jquery-ui.html plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding 2. the Open Handset Alliance: a consortium of hardware, software http://digimark.bg/en/mobile-os-platforms plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding 2. the Open Handset Alliance: a consortium of hardware, software http://apid.com.tr/android.php plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding 2. the Open Handset Alliance: a consortium of hardware, software https://hub.scaleway.com/android.html plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding
  • 13. 2. swiping, tapping, pinching and reverse pinching to manipulate on-screen http://www.slideshare.net/shassan573/process-models-38930047 plagiarised from source: >1% 1. approach to be followed based on the internal and external 2. Some situations where the use of Waterfall model is most appropriate are http://www.hcltech.com/sites/default/files/android_graphics_power_consumption_optimization_nitin_kumar_gar g_- _v2.0.pdf plagiarised from source: >1% 1. swiping, tapping, pinching and reverse pinching to manipulate on-screen 2. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used http://www.slideshare.net/smitpatel10192/etender-system plagiarised from source: >1% 1. with a brief study of different hardware used in the computerized 2. All the hardware needed here are generally http://www.pacepacker-services.co.uk/feasibility-studies.htm plagiarised from source: >1% 1. Typically this means estimating how long the system will 2. a given time period using some methods like payback http://www.evenja.org/doc/versus/oop plagiarised from source: >1% 1. represents concepts as "objects" that have data fields 2. interact with one another to design applications and computer programs http://www.academia.edu/5070224/An_Airline_Seat_Reservation_System plagiarised from source: >1% 1. The phased operation changeover method involves 2. In this approach risk of errors or failures is limited http://www.answers.com/Q/Changeover_methods_in_Management_information_systems plagiarised from source: >1% 1. The phased operation changeover method involves 2. In this approach risk of errors or failures is limited http://www.answers.com/Q/What_are_the_changeover_approaches_of_an_information_system plagiarised from source: >1% 1. The phased operation changeover method involves 2. In this approach risk of errors or failures is limited http://www.slideshare.net/sumitpaul14203/software-engineering-unit-1 plagiarised from source: >1% 1. the tasks within the time estimated in the project http://seminarprojects.com/Thread-payroll-management-system-full-report plagiarised from source: >1% 1. implementation, testing, installation, troubleshooting, and ends up at operation and http://www.academia.edu/6328712/SDLC plagiarised from source: >1%
  • 14. 1. implementation, testing, installation, troubleshooting, and ends up at operation and http://www.slideshare.net/ManoharIyer/comp-info-sys-asignments plagiarised from source: >1% 1. implementation, testing, installation, troubleshooting, and ends up at operation and http://en.wikibooks.org/wiki/Systems_Analysis_and_Design/Introduction plagiarised from source: >1% 1. implementation, testing, installation, troubleshooting, and ends up at operation and http://searchsoftwarequality.techtarget.com/definition/waterfall-model plagiarised from source: >1% 1. implementation, testing, installation, troubleshooting, and ends up at operation and http://www.slideshare.net/darshakmehta9/software-project-management-tools-45807859 plagiarised from source: >1% 1. the tasks within the time estimated in the project https://www.theseus.fi/bitstream/handle/10024/6803/Ma_Jun.pdf?sequence=1 plagiarised from source: >1% 1. their applicability to the expected needs of the proposed https://tr.linkedin.com/in/srturgut plagiarised from source: >1% 1. their applicability to the expected needs of the proposed http://www.slideshare.net/jeesuwarrior/documentation-of-railway-reservation-system plagiarised from source: >1% 1. their applicability to the expected needs of the proposed https://blog.udemy.com/php-oop-tutorial/ plagiarised from source: >1% 1. represents concepts as "objects" that have data fields http://www.slideshare.net/usriarc/final-sdlc-project-2 plagiarised from source: >1% 1. their applicability to the expected needs of the proposed http://www.academia.edu/4935972/ONLINE_ORDERING_SYSTEM_PROJECT_PROPOSAL plagiarised from source: >1% 1. their applicability to the expected needs of the proposed http://highered.mheducation.com/sites/0072853182/student_view0/chapter24/chapter_summary.html plagiarised from source: >1% 1. the tasks within the time estimated in the project http://rubygarage.github.io/public/oop/ plagiarised from source: >1% 1. that describe the object) and associated procedures known as http://a4academics.com/final-year-be-project/11-be-it-cse-computer-science-project/63-data-structures-and-algo rithms-visualization-tool plagiarised from source: >1%
  • 15. 1. The study will decide if the proposed system will http://www.academia.edu/1840549/IFIP_Virtual_University_Case_Study plagiarised from source: >1% 1. The study will decide if the proposed system will http://www.slideshare.net/ravalsneh/android-application-and-unity3d-game-documentation plagiarised from source: >1% 1. The study will decide if the proposed system will http://docarvin.mdl2.com/ plagiarised from source: >1% 1. interact with one another to design applications and computer programs http://www.tutorialspoint.com/object_oriented_analysis_design/ooad_object_oriented_paradigm.htm plagiarised from source: >1% 1. interact with one another to design applications and computer programs http://coding-school.com/perl-oop/ plagiarised from source: >1% 1. representing essential features without including the background details or http://learn2expert.net/Interview/OOPS_Part05 plagiarised from source: >1% 1. representing essential features without including the background details or http://www.slideshare.net/praveenjigajinni/5-general-oop-concepts plagiarised from source: >1% 1. representing essential features without including the background details or http://www.javatechnologycenter.com/question/java/ plagiarised from source: >1% 1. representing essential features without including the background details or http://www.academia.edu/1737964/Object_Oriented_Programming_2_Mark_Questions plagiarised from source: >1% 1. representing essential features without including the background details or http://www.cpp-home.com/archives/206.html plagiarised from source: >1% 1. representing essential features without including the background details or http://www.techopedia.com/definition/3736/abstraction plagiarised from source: >1% 1. representing essential features without including the background details or http://wiki.tcl.tk/13398 plagiarised from source: >1% 1. representing essential features without including the background details or http://www.slideshare.net/AsadMasoodQazi/all-net-questions plagiarised from source: >1% 1. data from all other codes and
  • 16. http://planopedia.com/wiki/telos/ plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic http://solidswiki.com/index.php?title=Feasibility_Studies plagiarised from source: >1% 1. to develop, and if it can be completed http://www.shumon.me/decode/qa/ plagiarised from source: >1% 1. data from all other codes and http://www.micc.unifi.it/bertini/download/labtecinf/C A Beginner's Guide 2nd Edition (2003).pdf plagiarised from source: >1% 1. those qualities that make it unique within its http://www.devarticles.com/c/a/Java/An-Overview-of-Java/1/ plagiarised from source: >1% 1. those qualities that make it unique within its http://www.academia.edu/5903896/Chapter_1_The_Creation_of_C plagiarised from source: >1% 1. those qualities that make it unique within its http://www.iosrjournals.org/iosr-jce/papers/Vol15-issue1/K1515966.pdf?id=7571 plagiarised from source: >1% 1. those qualities that make it unique within its http://www.byte-notes.com/oop-concepts-c plagiarised from source: >1% 1. those qualities that make it unique within its http://i-learn.uitm.edu.my/OERApp/CourseFile/818391780/Topic 1 - Introduction to Object Oriented Programm.swf plagiarised from source: >1% 1. those qualities that make it unique within its http://www.java-samples.com/showtutorial.php?tutorialid=42 plagiarised from source: >1% 1. those qualities that make it unique within its http://www.slideshare.net/SafiUllah2/hospital-management-system-25384877 plagiarised from source: >1% 1. entity B there is only one instance of entity http://www.slideshare.net/vilasitanandamuri/vilasitaoracle-basic-fundamentals plagiarised from source: >1% 1. entity B there is only one instance of entity http://www.slideshare.net/edhole/mba-ebooks-edhole-35029754 plagiarised from source: >1% 1. a given time period using some methods like payback
  • 17. http://web.simmons.edu/~benoit/lis486/s13/readings/DataModeling-ER1.pdf plagiarised from source: >1% 1. entity B there is only one instance of entity http://ecomputernotes.com/fundamental/what-is-a-database/basic-construction-of-e-r-modeling plagiarised from source: >1% 1. entity B there is only one instance of entity http://www.freetutes.com/systemanalysis/sa7-degree-of-entity-relationship-type.html plagiarised from source: >1% 1. entity B there is only one instance of entity http://www.slideshare.net/roying/lecture-2-conceptualizing-a-festive-event plagiarised from source: >1% 1. a given time period using some methods like payback https://www.st.cs.uni-saarland.de/edu/se/2013/files/slides/04-Managing Projects.pdf plagiarised from source: >1% 1. Known risks are those that can be uncovered http://www.slideshare.net/JalPari13/document-for-voice-banking-system-mini-project plagiarised from source: >1% 1. associated with one, zero or many instances of another http://feedback.bizagi.com/suite/en/responses/data-navigation-from-a-collection-attached-to-wfuser plagiarised from source: >1% 1. associated with one, zero or many instances of another http://post.milathan.com/2015/01/ plagiarised from source: >1% 1. .Net is considered by many to http://www.velmultimedia.com/android.pdf plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch https://www.st.cs.uni-saarland.de/edu/se/2012/lecture-slides/06-Managing-Projects.pdf plagiarised from source: >1% 1. Known risks are those that can be uncovered http://www.bashguru.com/2009_12_01_archive.html plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch http://www.bashguru.com/2010/12/shell-script-to-generate-fibonacci.html plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch http://www.bashguru.com/2008_03_01_archive.html plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch http://www.bashguru.com/2010/03/unixlinux-advanced-file-permissions.html
  • 18. plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch http://www.onestoplinux.com/p/android_25.html plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch http://www.leagoo.com.my/cs-knowledge.html plagiarised from source: >1% 1. Linux kernel, and designed primarily for touch https://rs2tech.com/RS2WebApp/Universalv3.aspx plagiarised from source: >1% 1. mobile devices such as smart phones and tablet https://www.devbridge.com/chicago-mobile-development/ plagiarised from source: >1% 1. mobile devices such as smart phones and tablet http://www.wccnet.edu/about-us/mobile/ plagiarised from source: >1% 1. mobile devices such as smart phones and tablet http://www.insitesoft.com/blog/is-your-website-ready-for-mobile-friendly-search/ plagiarised from source: >1% 1. mobile devices such as smart phones and tablet https://www.vasont.com/news-releases/vasont-app-support.html plagiarised from source: >1% 1. mobile devices such as smart phones and tablet http://adxmedia.com/mobile-web-design.html plagiarised from source: >1% 1. mobile devices such as smart phones and tablet http://www.aaos.org/news/aaosnow/jun12/clinical11.asp plagiarised from source: >1% 1. mobile devices such as smart phones and tablet http://www.bbc.com/news/business-13962653 plagiarised from source: >1% 1. mobile devices such as smart phones and tablet http://ijrcm.org.in/download.php?name=ijrcm-2-IJRCM-2_vol-3_2013_issue-11-art-16.pdf&path=uploaddata/ijrc m- 2-IJRCM-2_vol-3_2013_issue-11-art-16.pdf plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic http://www.infobridgesolutions.com/technical-showcase plagiarised from source: >1% 1. Android was unveiled in 2007 along with the founding http://www.angieslist.com/articles/how-much-does-new-lawn-mower-cost.htm
  • 19. plagiarised from source: >1% 1. requires regular maintenance so it won’t https://readytogo.microsoft.com/en-us/_layouts/Download.aspx?SourceUrl=https://readytogo.microsoft.com/en- us/Asset/RTG Anonymous Asset Library/40 ModernBiz - Demo Script.docx plagiarised from source: >1% 1. failure and we can prevent data http://www.fibtex.lodz.pl/2014/5/34.pdf plagiarised from source: >1% 1. be assessed as very low http://onlinelibrary.wiley.com/doi/10.1111/j.1574-695X.2006.00101.x/full plagiarised from source: >1% 1. be assessed as very low https://fp7.portals.mbs.ac.uk/Portals/59/docs/MC deliverables/WP2 S Durst working paper1_IntangibleRiskDisclosure.pdf plagiarised from source: >1% 1. be assessed as very low http://www.mrc.ac.uk/documents/pdf/mrc-submission-ec-concept-paper-on-revision-of-clinical-trials-directive-m ay- 2011/ plagiarised from source: >1% 1. be assessed as very low http://www.academia.edu/6169082/Report_on_Android plagiarised from source: >1% 1. the Open Handset Alliance: a consortium of hardware, software http://thegamesdb.net/platforms/ plagiarised from source: >1% 1. the Open Handset Alliance: a consortium of hardware, software http://codexdesign.in/android-applications-development/ plagiarised from source: >1% 1. swiping, tapping, pinching and reverse pinching to manipulate on-screen http://www.scielo.br/scielo.php?pid=S1519-69842013000200279&script=sci_arttext&tlng=es plagiarised from source: >1% 1. be assessed as very low http://canadiantaskforce.ca/files/guidelines/2015-lung-cancer-protocol-en.pdf plagiarised from source: >1% 1. be assessed as very low http://www.underconsideration.com/brandnew/archives/new_logo_for_android.php plagiarised from source: >1% 1. swiping, tapping, pinching and reverse pinching to manipulate on-screen http://techcrunch.com/topic/product/android/ plagiarised from source: >1%
  • 20. 1. swiping, tapping, pinching and reverse pinching to manipulate on-screen http://en.wikipedia.org/wiki/LuneOS plagiarised from source: >1% 1. swiping, tapping, pinching and reverse pinching to manipulate on-screen http://www.gsu.by/biglib/GSU/Иностранных языков/Презентации студентов/Английский для математиков/Android.ppt plagiarised from source: >1% 1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used http://knowyourmeme.com/memes/subcultures/android-os plagiarised from source: >1% 1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used http://jderobot.org/Evelinfv plagiarised from source: >1% 1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used http://www.youtube.com/watch?v=6Nyt_gjiLU8 plagiarised from source: >1% 1. Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used http://www.slideshare.net/fdgiraldo/m-project-planning plagiarised from source: >1% 1. be assessed as very low http://www.sanfoundry.com/software-engg-mcqs-project-management/ plagiarised from source: >1% 1. be assessed as very low http://www.oiirj.org/oiirj/jan-feb2014/30.pdf plagiarised from source: >1% 1. customize their home screens with shortcuts to applications and widgets http://www.edbpriser.dk/skaerm/philips-272s4lpjcb-sort-id-8958560.aspx plagiarised from source: >1% 1. customize their home screens with shortcuts to applications and widgets http://itsabacus.com/mobile-application/ plagiarised from source: >1% 1. customize their home screens with shortcuts to applications and widgets http://www.academia.edu/10096820/B041130610 plagiarised from source: >1% 1. customize their home screens with shortcuts to applications and widgets http://www.liceomundofeliz.com/web/track-iphone/whatsapp-spy-location.html plagiarised from source: >1% 1. allow users to display live content, such as emails and http://www.finalconcept.com.au/article/view/android-account-manager-step-by-step-2 plagiarised from source: >1%
  • 21. 1. allow users to display live content, such as emails and http://odvkc.com/logos/sms-location/phone-tracker-location.html plagiarised from source: >1% 1. allow users to display live content, such as emails and http://www.youtube.com/watch?v=cESqm80XPXk plagiarised from source: >1% 1. allow users to display live content, such as emails and http://pubs.sciepub.com/ajmm/2/2/1/ plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic http://www.answers.com/Q/What_is_direct_changeover plagiarised from source: >1% 1. The phased operation changeover method involves http://www.answers.com/Q/Criticism_of_system_approach plagiarised from source: >1% 1. In this approach risk of errors or failures is limited http://www.answers.com/Q/What_is_a_phase_changeover plagiarised from source: >1% 1. The phased operation changeover method involves https://www.linkedin.com/pulse/value-feasibility-studies-david-fisher-the-web-lender plagiarised from source: >1% 1. feasibility assessment is to determine the positive economic http://www.answers.com/Q/What_is_a_SALS_approach_lighting_system plagiarised from source: >1% 1. In this approach risk of errors or failures is limited http://www.slideshare.net/mahmoudghonim/dot-net-interviewquestions-29529402 plagiarised from source: >1% 1. data from all other codes and
  • 22. GUJARAT TECHNOLOGICAL UNIVERSITY [UNDERTAKING ABOUT ORIGINALITY OF WORK] We hereby certify that we are the sole authors of this IDP/UDP project report and that neither any part of this IDP/UDP project report nor the whole of the IDP/UDP Project report has been submitted for a degree by other student(s) to any other University or Institution. We certify that, to the best of our knowledge, the current IDP/UDP Project report does not infringe upon anyone’s copyright nor violate any proprietary rights and that any ideas, techniques, quotations or any other material from the work of other people included in our IDP/UDP Project report, published or otherwise, are fully acknowledged in accordance with the standard referencing practices. Furthermore, to the extent that we have included copyrighted material that surpasses the boundary of fair dealing within the meaning of the Indian Copyright (Amendment) Act 2012, we certify that we have obtained a written permission from the copyright owner(s) to include such material(s) in the current IDP/UDP Project report and have included copies of such copyright clearances to our appendix. We have checked the write up of the present IDP/UDP Project report using anti-plagiarism database and it is in the allowable limit. In case of any complaints pertaining to plagiarism, we certify that we shall be solely responsible for the same and we understand that as per norms, University can even revoke BE degree conferred upon the student(s) submitting this IDP/UDP Project report, in case it is found to be plagiarised. Team: Enrolment number Name Signature 110410107004 Krunal Ashwinkumar Patel 110410107063 Devang Devendrakumar Mistry 110410107016 Achal Ghanshyambhai Patel Place: Vadodara Date: 20/05/2015 Name of Guide Prof. Barkha M Joshi Signature of Guide
  • 23. Page i ACKNOWLEDGEMENT Our efforts in making this project, a success, would not have been of use without the kind support and help of many individuals and seniors. We would like to extend our sincere thanks to all of them. We are very grateful to our Principal DR. J. V. Deshkar for providing us with an environment where we could able to complete our project successfully. We are grateful to Prof. BARKHA M. JOSHI for her guidance and constant supervision as well as for providing necessary information regarding the project and also for her support in completing the project. We would also like to thank Prof. BIJAL J. TALATI (Head of the Department) for helping us and providing her support for carrying out this project. We would like to express gratitude towards our parents & friends for their kind co-operation and encouragement which helped us in completion of this project. We would like to express special gratitude and thank you to faculties and technicians of our college for giving us such attention and time. Our thank you and appreciation also goes to MGVCL, for providing us the necessary infrastructure and facilities, along with worthy guidance in developing this project. It has been a great experience working with MGVCL, while undertaking this project. Also we would like to thank you our project guide Mr. C N Pendor (Superintending Engineer) for all his support during the development of the project.
  • 24. Page ii ABSTRACT In this project we take up one segment of the MGVCL (GEB), which is the tendering and tracking of the various projects in different sectors. In this project we build a web application which will contain the 3 different modules. The first module will contain the Authentication process i.e. User management and Vendor Management(Corporation interested to work for the project proposed by MGVCL (GEB) for e.g. companies like reliance, TATA etc.). The registered and authenticated vendors will be allowed to access the database. The MGVCL (GEB) will provide their project plans and definition as per the need in different sectors. The Second Module will contain the tendering process where the optimum and reliable vendor will be selected which meets the requirements of MGVCL (GEB) and the confirmation of reject or approval will be announced through mails to each vendor. The third module will contain the project progress report where the MGVCL (GEB) will assign milestones and the project manager to the vendor. Additionally we will develop a mobile application that will be used for live project tracking. With this system MGVCL (GEB) can propose the project and can do their progress track efficiently. This will also reduce the complexity and manual work involved in tracking process. FRONT - END: ASP.NET, HTML 5, ANDROID BACK – END: SQL
  • 25. Page iii LIST OF TABLES Table No. Table Description Page No. 1 Risk Analysis 11 2 Staff Data Dictionary 34 3 Vendor Data Dictionary 34 4 Project Data Dictionary 34 5 Bid Data Dictionary 35 6 Milestone Data Dictionary 35 7 Intermediate Report Data Dictionary 35 8 Test Values/Cases 57
  • 26. Page iv LIST OF FIGURES Figure No. Figure Description Page No. 1 System Flow 7 2 Gantt Chart 8 3 Waterfall Model 13 4 Class Diagram 16 5 Vendor Management Use Case Diagram 18 6 Staff Management Use Case Diagram 19 7 Project Announcement and Configuration Use Case Diagram 20 8 Tender Bidding Use Case Diagram 21 9 Project Progress Tracking Use Case Diagram 22 10 Project Progress Analysis Use Case Diagram 23 11 Vendor Registration Sequence Diagram 25 12 Tender Selection and Project Progress Analysis Sequence Diagram 25 13 Vendor Management Activity Diagram 27 14 Project Progress Tracking Activity Diagram 28 15 Database Design Diagram 29 16 Entity-Relationship (ER) Diagram 31 17 State Diagram 33 18 Observation Matrix Canvas 36
  • 27. Page v 19 Ideation Canvas 38 20 .NET Architecture 39 21 Android Architecture 40 22 Phase Implementation Environment 41 23 Sign Up for Vendor 42 24 Sign Up Validation Parameters for Vendor 42 25 Sign In for Vendor, Admin and Staff 43 26 Password Recovery 43 27 Dashboard (Admin Side) 44 28 List of Accepted or Awarded Projects (Vendor Side) 44 29 Project Search (Admin Side) 45 30 Project Detail (Admin Side) 45 31 Project Detail Validation Parameters (Admin Side) 46 32 Vendor Search (Admin Side) 46 33 Edit Vendor Details (Admin Side) 47 34 Staff Search (Admin Side) 47 35 Bid Selection (Admin Side) 48 36 Selected Bid (Admin Side) 48 37 Milestones (Admin Side) 49 38 Form for Declaring of New Milestone (Admin Side) 49 39 Milestone Detail Received from Android Application Sample 1 (Admin Side) 50
  • 28. Page vi 40 Milestone Detail Received from Android Application Sample 2 (Admin Side) 50 41 Intermediate Reports (Admin Side) 51 42 Intermediate Report Detail Received from Android Application (Admin Side) 51 43 Map Showing Location and GPS Coordinates (Admin Side) 52 44 List of Bids Placed on Various Projects (Vendor Side) 52 45 Contact Us (Vendor Side) 53 46 Assigned Projects (Staff Side) 53 47 Sign In for Staff (Android Application) 54 48 Assigned Projects (Android Application) 54 49 Assigned Milestones (Android Application) 55 50 Form to Fill Milestone Detail (Android Application) 55
  • 29. Page vii INDEX Acknowledgement i Abstract ii List of Tables iii List of Figures iv Index vii Chapter: 1 Introduction 1.1 Company Profile 1 1.1.1 Brief History 1 1.1.2 Company Details 1 1.1.3 Company Objective 1 1.2 Introduction to the Project 2 1.2.1 Background 2 1.2.2 Problems with the Current System 2 1.2.3 Aim/Definition of the Project 2 1.2.4 Scope of the Project 3 1.2.5 Purpose/Objectives of the Project 3 1.3 Brief Literature Review and Prior Art Search (PAS) 4 1.3.1 Patent Studied 4 1.3.2 Vendor/Market Search 4
  • 30. Page viii 1.4 Materials/Tools Required 5 1.4.1 Hardware Requirements 5 1.4.2 Software Requirements 5 1.4.3 Tools and Technology Used 5 1.4.4 Communication Interface 5 1.4.5 Constraints 5 1.5 System Flow 7 1.6 Project Plan 7 1.6.1 Project Schedule 7 1.6.2 Gantt Chart 8 Chapter: 2 Design: Analysis, Design Methodology and Implementation Strategy 2.1 Feasibility Study/Analysis 9 2.1.1 Operational Feasibility 9 2.1.2 Economic Feasibility 9 2.1.3 Technical Feasibility 10 2.1.4 Schedule Feasibility 10 2.2 Risk Management 10 2.2.1 Risk Identification 10 2.2.2 Risk Analysis 11 2.3 Requirement Analysis 11 2.3.1 Functional Requirements 11 2.3.2 Non-Functional Requirements 12
  • 31. Page ix 2.4 Design Methodology 13 2.4.1 Waterfall Model (Software Development Model) 13 2.4.2 Advantages of the Waterfall Model 14 2.4.3 Why We Chose this Model? 14 2.5 System Design Principles 14 2.5.1 Class Diagram 15 2.5.2 Use Case Diagram 17 2.5.3 Sequence Diagram 24 2.5.4 Activity Diagram 26 2.5.5 Database Design Diagram 29 2.5.6 Entity-Relationship (ER) Diagram 30 2.5.7 State Diagram 32 2.5.8 Data Dictionary 34 2.6 Canvases Analysis, Design and Implementation 35 2.6.1 Observation Matrix 35 2.6.2 Ideation Canvas 37 2.7 Implementation Strategy 38 2.7.1 Microsoft ASP.NET Framework 38 2.7.2 Android 40 2.7.3 Implementation Environment (Phase Implementation) 41
  • 32. Page x Chapter: 3 Implementation 3.1 Screenshots/User Interface Design 42 3.2 Testing Plan 56 3.2.1 Testing Strategy 56 3.2.2 Test Values/Cases 57 Chapter: 4 Summary of the Results and Conclusion 4.1 Summary of the Results 62 4.2 Usefulness with Respect to Existing Solution 62 4.3 Limitations of Our System 62 4.4 Future Enhancement 63 4.5 Conclusion 63 References Appendix I Periodic Progress Reports (PPR) Appendix II Business Model Canvas (BMC) and its Reports Appendix III Patent Drafting Exercise
  • 33. Page 1 CHAPTER 1 INTRODUCTION 1.1 COMPANY PROFILE 1.1.1 BRIEF HISTORY As a part of efforts towards restructuring of Power Sector, a new Company known as Madhya Gujarat Vij Company Limited was incorporated on 15th September, 2003, by Gujarat Electricity Board (GEB). The Company obtained the Certificate of Commencement of Business on 15th October, 2003. As a part of Power Reform Process, Gujarat Electricity Board (GEB), the promoting body, has been un-bundled effective from 1st April, 2005, into separate seven Companies with functional responsibilities with complete autonomous operation for:  Generation  Transmission  Distribution  Trading Accordingly, the distribution undertakings and functions of the Central Distribution Zone of the erstwhile GEB stand transferred to and vest in the Company effective from 1st April, 2005. The company has become operational effective from 1st April, 2005. 1.1.2 COMPANY DETAILS Company Name: Madhya Gujarat Vij Company Limited (MGVCL) Company Address: Sardar Patel Vidyut Bhavan, Race Course, Vadodara–390007 Company Type: Power Distribution Public Limited (Subsidiary of GUVNL) Contact Person: C N Pendor 1.1.3 COMPANY OBJECTIVE Madhya Gujarat Vij Company Limited is committed to Distribute and maintain Reliable Electric Power, Satisfy all its Customer through Excellence in service by way of Safe and Sturdy Distribution Network with Dedication to Continual Improvement in all sphere of Activities. The company is responsible for reliable and affordable power distribution to residential areas, commercial complexes, streetlights, water works, agriculture, traction as well as industries.
  • 34. Page 2 1.2 INTRODUCTION TO THE PROJECT 1.2.1 BACKGROUND Project Tendering and Tracking Application is a type of web application dedicated for providing tendering and tracking of various projects in different areas. The goal of our web application is to make the online tendering more efficient with bidding. For Progress Tracking of the all live projects, a mobile application will be developed. Project Tendering and Tracking Application also utilises advanced techniques like Camera for taking photo of the progress work on ongoing project sites and viewing uploaded contents on web application sent from android application. 1.2.2 PROBLEMS WITH THE CURRENT SYSTEM Currently there is a website like http://www.mgvcl.com/ which provides most of the necessary information as list of tenders announced, list of the awarded tenders, viewing of terms and conditions of every tender awarded etc. But following are some points which are not available and we aim at improving that:  Restricted Mobility  Poor User Interface  No Proper Search Medium  Less Graphical Content, Making it Mundane  Non-Efficient Modularity  Haphazard Data Retrieval  Non Centralized Data Storage  Security Problems  Requires More Human Resource  Much Costlier and Consumes Longer Time 1.2.3 AIM/DEFINITION OF THE PROJECT Project Tendering and Tracking Application is a system which automates various tasks such as tendering, bidding and tracking of the live projects. The system will provide user the interface where he/she will be able to perform the track of the organizations live projects and be assured about the progress which is not possible by depending upon the human force. Project Tendering and Tracking Application is a concept of supporting the MGVCL by the means of easy bidding, better administration and more technology oriented way of tracking with the help of Internet that makes current way of tendering more interesting. Project Tendering and Tracking Application aims to overcome this:  Enhanced Productivity and Satisfaction: Our system helps in improving communication system between the Vendors, Staff and Admin. The process of real time monitoring considerably reduced customer response time thus, enhanced their efficiency.  More Saving in Costs: Reduced waiting times from vendor side as they can see the projects awarded to them within seconds, minimized staff recruitment cost helps to give an efficient system.
  • 35. Page 3  Efficient Management: Before our system, Admin once faced problems like mismanagement, low level of communications etc. But after the incorporation of our System, it became easy for the Admin to manage as Admin can now be in touch with all the aspects of the system, their vendors and staff.  A Common Platform and Efficient Usage of Services: The application brings several new vendors on a single platform and helps Admin retain the existing ones with the efficient service and a user- friendly application. 1.2.4 SCOPE OF THE PROJECT Project Tendering and Tracking Application exists to fulfill the basic principles of tendering, which are to Reduces Paper work, human effort and consumes less time. The Tracking part makes project progress to be performed efficiently. Also The Application will provide an extra security by providing access to only authenticate users. Project Tendering and Tracking Application system is helpful for all age of people. If this type of system will be applied in real world then this system will create a revolution into the tendering and tracking mechanism service. 1.2.5 PURPOSE/OBJECTIVES OF THE PROJECT Project Tendering and Tracking Application purpose/objective is to provide user friendly environment to vendors so that they can easily be able to interact with the organization i.e. place their bids and get results. Application will provide the user with the tools to develop progress charts, take pictures of location and other such activities which will ease up their tracking mechanism of the projects that the organization is currently working on. Project Tendering and Tracking Application is a Web application project which is developed in ASP.Net as well as an Android Application. The Application is useful for the Vendors who can access this facility such as Bid on various announced projects, include their terms and conditions on various projects and various other facilities. The Application is also useful for MGVCL as MGVCL can now manage their staff for tracking of various awarded projects. Project Tendering and Tracking Application objective is to provide the below mentioned advantages and is very well able to provide these advantages:  More Secure  Automated and Accurate Process  Lifelong Storage and Back Up as well as Restore  Centralized Data Storage  Efficient Data Retrieval  Ease Mobility  Live Project Tracking with GPS and Image  Less Costlier  Less Human Resource Involvement
  • 36. Page 4 1.3 BRIEF LITERATURE REVIEW AND PRIOR ART SERCH (PAS) 1.3.1 PATENT STUDIED  Patent Number: WO 2007066357 A2  Title of Invention: A process for securing tendering system  Summary of Invention: The main object of the present invention is to provide a process for securing tendering system. The other object is to provide a unique technique/mechanism for an automatic system for electronically conducting on the Internet/ Intranet the complete process of Tendering/ Procurement by Government and professional corporate organizations globally. Another object is to provide e-tendering that includes all steps from Obtaining of Internal Approvals (i.e. the Pre-Tendering processes) to Award of Contract and Monitoring of the Award and all intermediate steps exemplified by online submission of digitally-signed and encrypted bids in time- locked event managed tender boxes, public online tender-opening event. Further the system is provided with comprehensive Security and Transparency related features necessary for Transparent functioning as required by/ expected of Government organizations and Multi-lateral agencies globally. Yet other object is to provide electronic tendering system with flexibility for handling open as well as limited tenders. Yet another object is to provide a system having on line facility for appending corrigenda, storing tender/bidding documents, accessibility to bidding documents only by the authorized bidders (in case of limited tenders), ability to access entire tender/ bidding documents by prospective suppliers, facility for online as well as offline payment, use of secured means by the bidders themselves, facility for on line negotiations and meetings , comprehensive matrix for multiple levels authorization for each organization, ability to integrate manual bidders. Still other object is to provide a system with online customization of the tendering processes to align these to the tendering policy of the concerned Government Organization and Rules for each tender, which does not require any technically skilled personnel. 1.3.2 VENDOR/MARKET SEARCH It is difficult to perform all the operations such as bidding, tracking etc. at one stop. Mentioned below are some points which are seen in the current market:  Not Much Attractive User Interface  Not all Modules Specified on the Homepage are Fully Functional  Incomplete Information  Scattered Information  A Common Interactive Platform  Less Graphical Content gets it Mundane  No Proper Search Medium
  • 37. Page 5 1.4 MATERIALS/TOOLS REQUIRED 1.4.1 HARDWARE REQUIREMENTS  Client Side: (For best performance) Any GUI based terminal having at least 800*600,256-color displays.1024 X 768 32 bit recommended.  Server Side:  Supported Architectures: x86, x64, ia64 (Windows Server 2008)  RAM: 96 MB (256 MB Recommended)  400 MHz CPU (1.0 GHz Recommended)  1 GB of Hard Disk Space. 1.4.2 SOFTWARE REQUIREMENTS  Operating System: Microsoft Windows XP, Microsoft Windows Server 2003, Windows Vista, Windows 7, Windows Server 2008.  Web Server: IIS 6.0 and Higher  Server Side Scripting: .NET Framework 3.5 and Higher  Database Management System: SQL Server 2005 and Higher  Other Software Tools: Microsoft Word 2007 and Higher 1.4.3 TOOLS AND TECHNOLOGY USED This phase of the software development process deals with a brief study of different hardware used in the computerized system. There is a list of hardware materials used during the making and also during the use of the proposed project. All the hardware needed here are generally the basic configuration of a typical office computer. A list of the hardware requirement used in the system is given below:  Front End: Microsoft Visual Studio 2010, ASP.Net 4.0 with C#.Net 2010  Back End: SQL Server 2008 R2  Documentation Tools: MS Office Word 2007, MS Office Visio 2007  Reporting Tool: MS Office Excel 2007  Hardware Requirements: RAM: 2GB, Hard Disk: 80GB, Processor: Dual Core or Higher, Gateway/routers, Monitor, Keyboard, Mouse, Microphone, Webcam and its utility drivers.  Operating System: Windows XP version or Higher. MAC OS and LINUX. 1.4.4 COMMUNICATION INTERFACE The interface of our application mainly includes hypertext transfer protocol. The main communication interface is the terminal node, which the user uses. 1.4.5 CONSTRAINTS  Regulatory Policies: System does not apply to any regulatory policy as the project developed is a Web-Based application to be used as product for the personalized use of the company’s internal use itself.  Hardware Limitations: The installation of Microsoft Visual Studio.NET requires that the RAM cannot be less than 500 MB but ideal would be 2GB and the processor cannot be less than 1.4 GHz speed.
  • 38. Page 6  Interfaces to Other Applications: This system can be easily interfaced with the underlying windows application for uniform flow from the windows application to the Web-based application and vice versa. This eases the way notifications can be provided to the administrator for the various activities done by the retailer / sales person. When the system will become functional the Client Side systems require the presence of Microsoft Office 2007 or above. This enables them to generate reports in the form of office documents. The system can easily locate the presence of Office and generate reports in that format without the user performing any changes for the same to be functional.  Higher Order Language Requirements: System Web-Based module uses ASP.NET 3.5 as it is the most viable technology for the project. SQL SERVER 2005 is used as the database system as it is most compatible with .NET 3.5 and is easy to simulate. C# is used as the programming language with ASP.NET 3.5 as it is much more concise than many of the other .NET languages like VB. There are lots of places where there is no need to Post Back the page to server and only client side scripting would suffice the requirements so java scripts were incorporated along with the ASP.NET code.  Safety and Security Consideration:  Safety: The user cannot see the system source code and thus when browsing no changes can be made into the system. When the session gets timed out or the user logs off, after that, the query string supposedly obtained using unfair means will be of no use as the session variables are removed and there is no existence of the data present which can be manipulated.  Security: As there are many hackers trying to invade the system using unfair means an alternative was implemented which could reduce the threat of stealing of passwords quite a lot. The passwords will be generated again after every one month. When need to login to the system the password is sent via email. Thus, there are very less chances of passwords being hacked as they keep on changing every month.
  • 39. Page 7 1.5 SYSTEM FLOW Figure 1 System Flow 1.6 PROJECT PLAN 1.6.1 PROJECT SCHEDULE Software Project Scheduling Principles:  Compartmentalization: The product and process must be decomposed into a manageable number of activities and tasks.  Interdependency: Tasks that can be completed in parallel must be separated from those that must be completed serially.  Time Allocation: Every task has start and completion dates that take the task interdependencies into account.  Effort Validation: Project manager must ensure that on any given day there is enough staff members assigned to complete the tasks within the time estimated in the project plan.  Defined Responsibilities: Every scheduled task needs to be assigned to a specific team member.  Defined Outcomes: Every task in the schedule needs to have a defined outcome (usually a work product or deliverable).  Defined Milestones: A milestone is accomplished when one or more work products from an engineering task have passed quality review. Vendor Registration Project Announcement Vendor Submits For Project Tender Award Project Tender Add Milestones to Project Submit the Project Status Report View Project Progress Records Compare Actual Progress with Planned Schedule Generate Analysis Report
  • 40. Page 8 1.6.2 GANTT CHART Timeline (Gantt) chart enables software planners to determine what tasks will be need to be conducted at a given point in time (based on estimates for effort, start time, and duration for each task). Figure 2 Gantt chart
  • 41. Page 9 CHAPTER 2 DESIGN: ANALYSIS, DESIGN METHODOLOGY AND IMPLEMENTATION STRATEGY 2.1 FEASIBILITY STUDY/ANALYSIS It is an estimate that is made up of whether the users of the system need to be satisfied using the current software and hardware technologies. The study will decide if the proposed system will be cost-effective from a business point of view and if it can be developed within given existing budgetary constraints. A feasibility study should be relatively cheap and quick. So, the result should inform the decision of whether to go ahead or not. Major areas for feasibility study are discussed below: 2.1.1 OPERATIONAL FEASIBILITY Operational Feasibility checks whether the system is operationally feasible or not. It will examine the various operational parameters for the same. We will check operational feasibility of the given system by answering certain questions which are listed below:  Does system provide adequate throughput and response time?  This system will provide adequate throughput and adequate response time to make the system operationally feasible, make faster operation of different modules of the system. Response time is very critical for the system for its faster operation.  Does the system make maximum use of available resources including people, time, flows of forms, minimum processing delays and the like?  Our system will make maximum use of available resources such as utilizing maximum functionalities of .NET, also utilizes maximum man-power and along with it, it maintains time duration. It will also maintain various flows of forms for the proper working of the system. It will keep a watch on the processing and provides necessary functionalities to overcome the processing delays. It will utilize each resource with proper time duration to maintain the efficient working of the system. This is necessary to make the system operationally feasible.  Does the system provide desirable & reliable service to those who need it? Is the system flexible and expandable?  Our system will provide desired characteristics and services to the various users. The system follows three tier architecture of application development with Presentation, Business and Data access separated into different parts / tiers which have their own role as their name suggests. If there is any expansion in one of the tiers, only that one needs to be amended. For e.g. a change in presentation tier does not affect the business class library. 2.1.2 ECONOMIC FEASIBILITY The purpose of the economic feasibility assessment is to determine the positive economic benefits to the organization that the proposed system will provide. It includes quantification and identification of all the benefits expected. This assessment typically involves a cost/ benefits analysis. The initial cost incurred to change the current system will very large as it requires the use of new devices like Tablets and GPS Devices. However once the system will be updated, there will minimal expenditure is required in the future.
  • 42. Page 10 2.1.3 TECHNICAL FEASIBILITY The technical feasibility assessment is focused on gaining an understanding of the present technical resources of the organization and their applicability to the expected needs of the proposed system. It is an evaluation of the hardware and software and how it meets the need of the proposed system. This new system will require new resources such as GPS devices, Tablets. This will be a major change in current flow of work as the equipment has changed significantly. The use of these resources will increase the efficiency of the system. 2.1.4 SCHEDULE FEASIBILITY A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable. Our project schedule is feasible as it will be completed within 1 year. First 6 months will be taken for requirement gathering, analysis and designing of the system. The next 6 months will be required for an actual implementation of the system. The actual implementation of the system will take longer time to be applied practically as the new system is drastically different form the current system. 2.2 RISK MANAGEMENT There are different categories of risk. Risk that are to be analyzed like project risks , business risks , technical risks , known risks , predictable risks and unpredictable risks. Project risks identify potential budgetary, schedule, personal that includes staff and organization, resources, customers and requirement problems and they impact on software projects. Technical risks identify potential design; implementation, interface, verification, maintenance problems, specification ambiguity, technical uncertainness and technical obsolesce. Business risks threaten the viability of the software to be built. Known risks are those that can be uncovered after careful evaluation of the project plan, the business and technical environment in which the project is being developed. Predictable risks are extrapolated from past project experience. Unpredictable risks are extremely difficult to identify in advance. 2.2.1 RISK IDENTIFICATION  Technology: While system is building / compiling and end-user request to access and manipulate information then system get re-configure and user get configuration error.  Hardware: Website runs on some Server. So all hardware related problems like power failure and server down problems must be managed effectively by our hardware team.  Software: Website is depending on the database. There are other external libraries and tools like Web-Server, and client tools etc. requires regular maintenance so it won’t get failure and we can prevent data lost.
  • 43. Page 11  People: As Website is a database driven which contains lots of concepts and tools that are used, it require understanding all features and functionalities, also how it get implemented and affected by web-module. So we need to interact to Technical Manager and other employees to understand tool and concepts effectively. So we try to make this risk as small as by writing tutorials about tools and techniques we will be using.  Schedule: Each team member should respect the deadlines that the team has decided. When a team member knows that he will be unable to respect a given deadline, he should inform the other team members as soon as possible (preferably more than two days before the deadline), so that the team can find a way to solve the problem. 2.2.2 RISK ANALYSIS  Probability of the risks might be assessed as very low (<10%), low (10-25%), moderated (25-50%), high (50-75%), or very high (>75%).  Effects of the risk might be assessed as catastrophic, serious or tolerable. Table 1 Risk Analysis RISK PROBABILITY EFFECT Technology Moderate Tolerable Hardware Moderate Critical Software Low Tolerable Schedule High Critical People Moderate Tolerable Due To Illness Low Tolerable 2.3 REQUIREMENT ANALYSIS 2.3.1 FUNCTIONAL REQUIREMENTS  Staff Management  Create Staff  Search Staff  Update Staff  Deactivate Staff  Staff Access Management  Vendors Management  Vendor Registration  Search Vendors  Vendor Verification  Update Vendor  Deactivate Vendor  Vendor Expertise Management  Vendors History Management
  • 44. Page 12  Project Announcement & Configuration  Announce Project  Search Project  Update Project  Cancel Project  Assign Manager to Project  Tender Bidding  Bid for Project Tender (Vendor)  View Project Tender Bids (Staff)  Analyze Vendor History  Award Project Tender  Email Project Tender Award  Project Planning  Add Milestones to Project  View Project Schedule  Project Progress Tracking (Mobile App)  Take Picture of Actual Project Progress  Record GPS Coordinates & Timestamp  Submit the Project Status Report  View Pending Milestones  Complete Milestone  Project Progress Analysis  View Project Progress Records  Compare Actual Progress with Planned Schedule  Verify Picture and Location of the Progress on Map  Overdue Milestone Notification  Analysis Reports  Project Analysis Report  Vendor Performance Reports  Manager Performance Report 2.3.2 NON-FUNCTIONAL REQUIREMENTS  Quality Requirement: The quality in software development process is maintained by periodic reviews, documentation and verification at all appropriate stages. Quality review was done at the component level and when the data components were merged together.  Readability: Appropriate comments in the project source code are provided to provide readability so that the user can easily read and understand the project if need be. So the project will be helpful for interested person. Every care is taken that the application is functionally correct. A great degree of care has to be taken to ensure minimum / zero defects in the code. Also if there is an error occurring then a custom error page is made to be visible. This is done because if the user of the system sees an error page with all details then he might get confused and close down the project. In order to remove the fear, if any error occurs then it is redirected to custom page.  Modularity: The project was initially divided into different modules so as to provide easy understanding and debugging of the system. When module checking was completed satisfactorily the modules were merged into one system.  Modifiability: With the help of modularity and readability of the source code of the program the system will be easy to modify in the future as and when needed.
  • 45. Page 13  Portability: The project will be easy to implement on the client system which satisfy the minimum hardware requirements.  Easy to Use: This project will be easy to use and so shall incorporate self- explanatory GUI. The GUI contains the presence of tooltips and indications to navigate properly across the system. The system is provided with a user guide that may be accessed by the user when he faces some difficulty.  Maintainability: The project will provide easy maintenance of the otherwise loosely kept data which is only saved in the system but not used fruitfully. When an application is used, it has to be maintained. There could be additional requirements in terms of added functionality or feature. As the application is not to be maintained by the developers, the code kept is as less complex as possible such that it can be easily understood by the relevant person for modification. Also when new functionality was implemented but later on was not used then that data was also kept in various versions. If that data is also required to be implemented then that data can be taken from the earlier versions. This can be done easily by referring to the document which contains the details of all new additions in all the versions.  Fault tolerance / Error Reporting: Since the application will be used by non IT users it might be possible that operation might result into errors. The application should provide user friendly error messages and fault tolerance facility whenever any error occurs so that employees can understand and act in accordance. Also errors which are not yet identified and occur then those errors are logged into the database and the user is redirected to the same page which can be informed to the developer for further assistance.  Security: Since the application will be used by different users and many confidential data will been stored it is essential that the integrity and confidentiality of the data is maintained so that no leakage of user/vendor information take place and data remains safe and secure. Also authentication should been provided by application which will help to maintain only the authorized users to access and retrieve data. The allocation of task must been kept transparent and illegal access will been denied. 2.4 DESIGN METHODOLOGY 2.4.1 WATERFALL MODEL (SOFTWARE DEVELOPMENT MODEL) The waterfall model is also referred to as a linear-sequential life cycle model. It is very simple to understand and use. In a waterfall model, each phase must be completed before the next phase can begin and there is no overlapping in the phases. Figure 3 Waterfall Model
  • 46. Page 14 2.4.2 ADVANTAGES OF THE WATERFALL MODEL The waterfall model is the oldest and most widely used model in the field of software development. There are certain advantages of the waterfall model, which causes it to be the most widely used model as yet. Some of them can be listed as under:  Needless to mention, it is a linear model and of course, linear models are the most simple to be implemented.  The amount of resources required to implement this model is very minimal.  One great advantage of the waterfall model is that documentation is produced at every stage of the waterfall model development. This makes the understanding of the product designing procedure simpler.  After every major stage of software coding, testing is done to check the correct running of the code. 2.4.3 WHY WE CHOSE THIS MODEL? Every software developed is different and requires a suitable SDLC approach to be followed based on the internal and external factors. Some situations where the use of Waterfall model is most appropriate are:  Requirements are very well documented, clear and fixed.  Product definition is stable.  Technology is understood and is not dynamic.  There are no ambiguous requirements.  Ample resources with required expertise are available to support the product. We chose the waterfall model as our SDLC Process Model due to the reasons mentioned above. The development process of our application moves from concept, through design, implementation, testing, installation, troubleshooting, and ends up at operation and maintenance. Each phase of development proceeds in strict order. 2.5 SYSTEM DESIGN PRINCIPLES Object-oriented programming (OOP) is a programming paradigm that represents concepts as "objects" that have data fields (attributes that describe the object) and associated procedures known as methods. Objects, which are usually instances of classes, are used to interact with one another to design applications and computer programs.  Concepts of OOPS:  Abstraction: Abstraction refers to the act of representing essential features without including the background details or explanations.  Encapsulation: It is the mechanism that binds together code and data in manipulates, and keeps both safe from outside interference and misuse. In short, it isolates a particular code and data from all other codes and data.  Inheritance: It is the process by which one object acquires the properties of another object. This supports the hierarchical classification. Without the use of hierarchies, each object would need to define all its characteristics explicitly. However, by use of inheritance, an object need only define those qualities that make it unique within its class. It can inherit its general attributes from its parent. A new sub- class inherits all of the attributes of all of its ancestors.
  • 47. Page 15  Polymorphism: Polymorphism means the ability to take more than one form. An operation may exhibit different behaviors in different instances. The behavior depends on the data types used in the operation.  Why we Chose OOP? Object-Oriented Programming has the following advantages over conventional approaches:  OOP provides a clear modular structure for programs which makes it good for defining abstract data types where implementation details are hidden and the unit has a clearly defined interface. 2.5.1 CLASS DIAGRAM  Class Notation: Classes are used to represent objects. Objects can be anything having properties and responsibility  Object Notation: The object is represented in the same way as the class. The only difference is the name which is underlined as shown below.
  • 48. Page 16 Figure 4 Class Diagram
  • 49. Page 17 2.5.2 USE CASE DIAGRAM  Use case Notation: Use case is represented as an eclipse with a name inside it. It may contain additional responsibilities.  Actor Notation: An actor can be defined as some internal or external entity that interacts with the system.
  • 50. Page 18 Figure 5 Vendor Management Use Case Diagram
  • 51. Page 19 Figure 6 Staff Management Use Case Diagram
  • 52. Page 20 Figure 7 Project Announcement and Configuration Use Case Diagram
  • 53. Page 21 Figure 8 Tender Bidding Use Case Diagram
  • 54. Page 22 Figure 9 Project Progress Tracking Use Case Diagram
  • 55. Page 23 Figure 10 Project Progress Analysis Use Case Diagram
  • 56. Page 24 2.5.3 SEQUENCE DIAGRAM  Sequence Notation: Sequence is basically message exchange between two UML components. The following diagram represents different notations used in an interaction.
  • 57. Page 25 Figure 11 Vendor Registration Sequence Diagram Figure 12 Tender Selection and Project Progress Analysis Sequence Diagram
  • 58. Page 26 2.5.4 ACTIVITY DIAGRAM Activity diagram is basically a flow chart to represent the flow form one activity to another activity. The activity can be described as an operation of the system. USE SYMBOL Initial State Activity Decision Flow of activity Final State
  • 59. Page 27 Figure 13 Vendor Management Activity Diagram
  • 60. Page 28 Figure 14 Project Progress Tracking Activity Diagram
  • 61. Page 29 2.5.5 DATABASE DESIGN DIAGRAM Figure 15 Database Design Diagram
  • 62. Page 30 2.5.6 ENTITY-RELATIONSHIP (ER) DIAGRAM Entity-Relationship (ER) Diagram, a graphical representation of entities and their relationships to each other, typically used in computing in regard to the organization of data within databases or information systems. An entity is a piece of data-an object or concept about which data is stored.  There are three types of relationships between entities:  One-to-One: One instance of an entity (A) is associated with one other instance of another entity (B).  One-to-Many: One instance of an entity (A) is associated with zero, one or many instances of another entity (B), but for one instance of entity B there is only one instance of entity A.  Many-to-Many: One instance of an entity (A) is associated with one, zero or many instances of another entity (B), and one instance of entity B is associated with one, zero or many instances of Entity A. USE SYMBOL Ellipse represents Attributes Diamond represents relationship between two entities Rectangle represents Entity
  • 63. Page 31 Figure 16 Entity-Relationship (ER) Diagram
  • 64. Page 32 2.5.7 STATE DIAGRAM  Initial State Notation: Initial state is defined to show the start of a process. This notation is used in almost all diagrams.  Final State Notation: Final state is used to show the end of a process. This notation is also used in almost all diagrams to describe the end.  State machine Notation: State machine is used to describe different states of a system component. The state can be active, idle or any other depending upon the situation. .
  • 65. Page 33 Figure 17 State Diagram
  • 66. Page 34 2.5.8 DATA DICTIONARY Column Type Nullable Key StaffID Int no Primary Name Varchar[20] no - Phone Number yes - Email Varchar[30] no - Address Varchar[30] no - Department Varchar[20] no - Username Varchar[10] no - Password Varchar[20] no - Designation Varchar[10] yes - IsActive Varchar[10] no - Table 2 Staff Data Dictionary Column Type Nullable Key VendorID Int No Primary Name Varchar[20] No - Email Varchar[30] No - Phone Varchar[15] Yes - Address Varchar[25] No - Username Varchar[8] No - Password Varchar[6] No - Expertise Varchar[10] Yes - IsActive Varchar[5] no - Table 3 Vendor Data Dictionary Column Type Nullable Key ProjectID int no Primary Name Varchar[20] no - StaffID Int no Foreign CreateDate Date no - TenderStartDate Date no - TenderEndDate Date no - Status Varchar[5] no - Description Varchar[20] yes - Attachments Attachment no - TermsConditions Varchar[50] yes - SelectedBidID Int no - StartDate Date no - EndDate Date no - Table 4 Project Data Dictionary
  • 67. Page 35 Column Type Nullable Key BidID Int No Primary ProjectID Int no Foreign VendorID Int no Foreign Amount Int no - TermsConditions Varchar[50] no - BidDate Date no - Table 5 Bid Data Dictionary Column Type Nullable Key MilestoneID int No Primary ProjectID int No Foreign PlannedDate date No - Description Varchar[20] Yes - CompletionDate Date No - Photo Attachment Yes - GPS Attachment Yes - Timestamp Attachment Yes - Remarks Varchar[20] Yes - StaffID Int No Foreign Table 6 Milestone Data Dictionary Column Type Nullable Key IntermediateReportID int No Primary ProjectID int No Foreign CompletionDate date No - Photo attachment Yes - GPS attachment Yes - Timestamp attachment Yes - Remarks Varchar[20] Yes - StaffID int No Foreign Table 7 Intermediate Report Data Dictionary 2.6 CANVASES ANALYSIS, DESIGN AND IMPLEMENTATION 2.6.1 OBSERVATION MATRIX  Objectives  Deals with Vendor, Staff and Admin  Deals with Tendering of Different Projects  Centralized System  Tracking of Live Projects in Any Area
  • 68. Page 36  Scouted Challenges  Online Tender Bidding  Award Project Tender  Vendor History  Project Progress Tracking  Project Progress Analysis Report  Top 5 Problems on the Basis of Desirability, Feasibility and Viability  Restricted Mobility  Security and Backup Issues  Live Project Tracking  24 X 7 Availability  Project Tender Award Via Mail (Notification)  Final Problem (Select 1 from Top 5)  To Provide an Efficient Way to Bid for the Announced Project Tenders as well as Live Project Tracking with GPS and Image Figure 18 Observation Matrix Canvas
  • 69. Page 37 2.6.2 IDEATION CANVAS  People  Project Manager  Administrator  Vendor  Web Developer  Web Designer  Staff  Activities  Vendor Registration  Project Scheduling  Take Image of Project Progress  Staff Access Management  Project Announcement  Assign Manager  Complete Pending Milestones  Bidding  Add Milestones to Project  Analysis Report  Situation/Context/Location  Rainfall  Railway/Bus Station  Any Situation  Hotel  Home  At Office  Airport  Props/Possible Solutions  Project Tracking  Vendor History  Vendor Performance Report  Manage Performance Report  Mobile Application  E-mail Notification  24 X 7 Service  Project Status Report  Retrievable Data  Resource Management
  • 70. Page 38 Figure 19 Ideation Canvas 2.7 IMPLEMENTATION STRATEGY 2.7.1 MICROSOFT ASP.NET FRAMEWORK  Introduction  Microsoft ASP.Net or simply, .Net, is a term that has stealthily but rapidly moved into software development nomenclature in the last few years.  .Net is considered by many to be the next step in the Internet revolution.  The .Net concept dates back to 1999 when it was a part of a discussion of Next Generation Windows Services.  Before the derivation of .Net, the acronym of choice by Microsoft was DNA – Distributed internet Architecture.  While .Net is immersed in this notion, it has by far surpassed its initial conception.
  • 71. Page 39  With successful promotion by Microsoft and widespread acceptance by companies, .Net has the potential to become the standard foundation for building powerful yet flexible Internet-centric applications.  Why .NET? From a paradigm where applications replicated code to provide common services, we have moved to a paradigm where applications are built as "collaborative units" of components working together. This simple shift has led to the collapse of the current set of architectures and demanded a new programming model: A model where applications can be built as reusable components and are sharable over the internet, a model that encourages applications to be shared as a "service" (read web services) and a model that enables true "interoperability" wherein the language used is only a matter of choice, thus enabling organizations to take advantage of existing skill sets. Figure 20 .NET Architecture  Value of ASP.NET Technology  Increased Application Reliability  Better Performance  Higher Level of Flexible Security  Integration and Interoperability  Decreased Programming Effort  Introduction to C#  It is important to interview C# not in isolation but as an integral part of the entire .NET framework.  .NET represents not only a revolution in facilities available for general-purpose Windows programming, but it will also be the immediate environment seen by your .NET code (more properly known as managed code) when it runs.  .NET brings about many benefits, including the easy-to-use object model, the garbage collection mechanism for automatically cleaning up resources, and far improved libraries covering areas ranging from Windows GUI support to data access and generating ASP.NET pages.
  • 72. Page 40  Advantages of C#  C# Supports COM (Component Object Model) and DCOM (Distributed Component Object Model) applications.  C# is fully Object Oriented Programming Language.  C# supports language interoperability. 2.7.2 ANDRIOD Android is an operating system based on the Linux kernel, and designed primarily for touch screen mobile devices such as smart phones and tablet computers. Initially developed by Android Inc. which Google backed financially and later bought in 2005. Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. The first Android phone (HTC Dream) was sold in October 2008. The user interface of Android is based on direct manipulation, using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects. Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some applications to respond to additional user actions, for example adjusting the screen from portrait to landscape depending on how the device is oriented. Android allows users to customize their home screens with shortcuts to applications and widgets, which allow users to display live content, such as emails and weather information, directly on the home screen. Applications can further send notifications to the user to inform them of relevant information, such as new emails and text messages. Android is the world's most widely used smartphone platform, overtaking Symbian in the fourth quarter of 2010 Android is popular with technology companies who require a ready-made, low-cost, customizable and lightweight operating system for high tech devices. Despite being primarily designed for phones and tablets, it also has been used in televisions, digital cameras and other electronics. The user interface of Android is based on direct manipulation, using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects. Figure 21 Android Architecture
  • 73. Page 41 Internal Hardware such as accelerometers, gyroscopes and proximity sensors are used by some applications to respond to additional user actions. Android allows users to customize their home screens with shortcuts to applications and widgets, which allow users to display live content, such as emails and weather information, directly on the home screen. 2.7.3 IMPLEMENTATION ENVIRONMENT (PHASE IMPLEMENTATION) Single Vs Multi-User, GUI Vs Non-GUI: Without a solid implementation plan executed by an experienced team, even good software will probably fail to meet expectations. Only when the implementation team has gone through a similar process within a construction company can the experience be complete. First-hand familiarity with the general workflow requirements of a construction business prepares the team to better guide the customer through a phased implementation process designed to save the company time and money. Our implementation methodology is phased Implementation. Phased implementation is a changeover process that takes place in stages. In our system implementation, firstly the system will handle certain small and less risky projects and other projects will be handled using old system. So that if the system fails risk can be minimized. Once system is working properly then the old system can be replaced with new system. The phased operation changeover method involves implementing the new system in stages, or modules. We can implement each subsystem by using any of the other three changeover methods. In this approach risk of errors or failures is limited to the implemented module only as well as it is less expensive than the full parallel operation. As the system, which we are implementing, involves various phased operation like live tracking, online bidding, project announcements, and etc. so it can cost more than the pilot approach. Figure 22 Phase Implementation Environment
  • 74. Page 42 CHAPTER 3 IMPLEMENTATION 3.1 SCREENSHOTS/USER INTERFACE DESIGN Figure 23 Sign Up for Vendor Figure 24 Sign Up Validation Parameters for Vendor
  • 75. Page 43 Figure 25 Sign In for Vendor, Admin and Staff Figure 26 Password Recovery
  • 76. Page 44 Figure 27 Dashboard (Admin Side) Figure 28 List of Accepted or Awarded Projects (Vendor Side)
  • 77. Page 45 Figure 29 Project Search (Admin Side) Figure 30 Project Detail (Admin Side)
  • 78. Page 46 Figure 31 Project Detail Validation Parameters (Admin Side) Figure 32 Vendor Search (Admin Side)
  • 79. Page 47 Figure 33 Edit Vendor Details (Admin Side) Figure 34 Staff Search (Admin Side)
  • 80. Page 48 Figure 35 Bid Selection (Admin Side) Figure 36 Selected Bid (Admin Side)
  • 81. Page 49 Figure 37 Milestones (Admin Side) Figure 38 Form for Declaring of New Milestone (Admin Side)
  • 82. Page 50 Figure 39 Milestone Detail Received from Android Application Sample 1 (Admin Side) Figure 40 Milestone Detail Received from Android Application Sample 2 (Admin Side)
  • 83. Page 51 Figure 41 Intermediate Reports (Admin Side) Figure 42 Intermediate Report Detail Received from Android Application (Admin Side)
  • 84. Page 52 Figure 43 Map Showing Location and GPS Coordinates (Admin Side) Figure 44 List of Bids Placed on Various Projects (Vendor Side)
  • 85. Page 53 Figure 45 Contact Us (Vendor Side) Figure 46 Assigned Projects (Staff Side)
  • 86. Page 54 Figure 47 Sign In for Staff (Android Application) Figure 48 Assigned Projects (Android Application)
  • 87. Page 55 Figure 49 Assigned Milestones (Android Application) Figure 50 Form to Fill Milestone Detail (Android Application)
  • 88. Page 56 3.2 TESTING PLAN Throughout the lifecycle of the system development, we consider some of the Testing principles in our mind before applying methods to design effective test cases, which are:  Tests should be planned before testing begins. Test planning can begin as soon as the coding phase is complete.  The Pareto principle applies to software testing. The Pareto principle implies that 80 percent of all errors uncovered during testing will likely be traceable to 20 percent of all program modules. The problem of course, is to isolate these suspect modules and to thoroughly test them.  Testing should begin “in the small” and progress toward testing “in the large”.  The first tests planned and executed generally focus on individual program modules. As testing progresses, testing shifts focus in an attempt to find errors in integrated clusters of modules and ultimately in the entire system. 3.2.1 TESTING STRATEGY Strategies of software testing used in the project:  Black Box Testing: Black box testing focuses on the functional requirements of the software .that is black box testing enables the software engineer to derive set of input conditions that will fully exercise all the functional requirements for the program, it uncovers different class of errors than the white box ones. Black box testing attempts to find out errors in the following categories and that’s the reason why we chose it:  Incorrect or missing functions.  Interface errors  Errors in data structures or external database access  Behavior or performance errors  Initialization and termination errors  White Box Testing: Logical paths through the software are tested by providing test cases that exercise specific sets of conditions and loops. It uses control structures of the procedural design to derive test case. Using White Box testing methods, the software engineer can derive test cases that provide features as mentioned; this is the reason why we chose it. The Software engineer can derive test case that:  Assured exercise of all independent paths in a module at least once.  Exercise all the logical decision on the true and false sides.  Execute all the loops at their boundaries & within their operational bounds.
  • 89. Page 57 3.2.2 TEST VALUES/CASES No. Test Case Input Expected Output Actual Output Remark 1 Trying to log in with null values Username and password with null values Invalid username and password Invalid username or password Passed 2 Login with invalid username and password Invalid username or password Invalid username or password Invalid username or password Passed 3 Login with valid username and password Valid username and password Valid username and password Valid username and password Passed 4 Designated rights on login Username and password Proper rights Proper rights were given Passed 5 Project Search by status Pending or Awarded or Completed or All List according to selected status List according to selected status Passed 6 Announcing project with empty name field Null value Name is required Name is required Passed 7 Announcing project with proper value in name field Non null value/value entered in name field Name is accepted Name is accepted Passed 8 Announcing project with empty Date fields. Null Values Date fields are to be filled Date is required Passed
  • 90. Page 58 9 Announcing project with proper value in date field Proper value in DD-MM-YYYY format Date is accepted Date is accepted Passed 10 Creating Vendor account with null value in required fields Null values Fields are required Fields are required Passed 11 Creating vendor account with alphanumeric mobile number Alphanumeric values Invalid Phone number Invalid phone number Passed 12 Creating vendor account with numeric mobile number Numeric values Phone number accepted Phone number accepted Passed 13 Creating vendor account without email format Values without following email format Email not valid Email not valid Passed 14 Creating vendor account with email format Values following email format Email accepted Email accepted Passed 15 Creating vendor account with different password and confirmation password Different values in password and confirm password Password does not match Password does not match Passed 16 Creating staff account with null value in required fields Null values Fields are required Fields are required Passed 17 Creating staff account with alphanumeric mobile number Alphanumeric values Invalid Phone number Invalid Phone number Passed
  • 91. Page 59 18 Creating staff account with mobile number Numeric values Phone number accepted Phone number accepted Passed 19 Creating staff account without email format Values without following email format Email not valid Email not valid Passed 20 Creating staff account with email format Values following email format Email accepted Email accepted Passed 21 Creating staff account with different password and confirmation password Different values in password and confirm password Password does not match Password does not match Passed 22 Add milestone to project without required fields Null value Field is required Field is required Passed 23 Add milestone to project with required fields Proper value Milestone added Milestone added Passed 24 View milestone- admin View milestone Milestone data viewed Milestone data viewed Passed 25 Change milestone -admin Change milestone Milestone changed Milestone changed Passed 26 View bids of all vendors for specific project - admin View bids Bids viewed Bids viewed Passed
  • 92. Page 60 27 Select bid for specific project - admin Select bid Bid accepted Bid accepted Passed 28 View selected bid -admin View selected bid Selected bid viewed Selected bid viewed Passed 29 View all pending projects View projects Project viewed Project viewed Passed 30 Submit bid form with null values Null values Field is required Field is required Passed 31 Submit bid form with proper values Proper values Bid form submitted Bid form submitted Passed 32 View accepted projects -vendor View projects Projects viewed Project viewed Passed 33 View bid details -vendor View bid Bid viewed Bid viewed Passed 34 View milestones -vendor View milestones Milestones viewed Milestones viewed Passed 35 View bid history -vendor View bid Bid history viewed Bid history viewed Passed
  • 93. Page 61 36 Staff login from android app with null values Username and password with null values Invalid username and password Invalid username and password Passed 37 Staff login from android app with invalid username or password Invalid username or password Invalid username or password Invalid username or password Passed 38 Staff login from android app with valid username or password Valid username and password Valid username and password Valid username and password Passed 39 Send report Send report Report submitted Report submitted Passed Table 8 Test Values/Cases
  • 94. Page 62 CHAPTER 4 SUMMARY OF THE RESULTS AND CONCLUSION 4.1 SUMMARY OF THE RESULTS  Our system will provide complete tendering and tracking services using the latest equipment and technology to facilitate the admin and vendor to manage the different projects at different area at different time. The company's products and services show that we are an innovative, forward thinking company that recognizes the need to move with ever-changing vendors needs. A realization that effective communication is a key component in our business; we developed an android application that performs tracking work. The company also realizes that, in a competitive environment, flexibility and efficiency maintain that leading edge.  The company has staff that is fully trained on the use of the computer system and android phones/smartphone. As an added verification measure for both vendors and admin, tracking android applications provides Global Positioning Systems (GPS) and image, which enable the admin to track the progress of awarded projects.  The company's strategy is to build reputation and market share by establishing our business offering as a viable alternative to existing methodology.  It provides a great deal of information about project announced in a very interactive way. It is a one stop shop for tendering and tracking providing a variety of information at one click.  It also provides user with information search bar, where one can search any relevant project. 4.2 USEFULNESS WITH RESPECT TO EXISTING SOLUTION As we know, there is already MGVCL website for this purpose. Our system will work same as their system but there are many differences between our system and their system including android application which is for tracking purpose also the online bidding is the new concept. Online project announcing is provided by the current system but Projects are not awarded which is provided by our system and that makes our system useful with respect to existing solution. 4.3 LIMITATIONS OF OUR SYSTEM Limitations of our system are:  Our system requires high bandwidth rate. The internet connection should be reliable.  The system requires a large database to store the contents like Photographs from android device.  As android devices are used for tracking mechanism the cost investment behind our system will be required more.
  • 95. Page 63 4.4 FUTURE ENHANCEMENT The Future scope of our system is:  An android application with better GUI can be made at the later stages.  More validation can be provided to the android application.  Video Conference between authorities and vendor or authorities and staff can be made possible at the later phase. 4.5 CONCLUSION Hereby, we conclude that our system will be helpful to each and every vendor that is interested to work with MGVCL on different projects. By implementing this system, everyone i.e. admin and vendor can have 24x7 hours quick, safe, easiest, convenient and accurate access to the web application through which they can know about the project progress easily. Also, MGVCL will get effective verified results on project progress due to Android tracking application. Thus, altogether this system will be useful in each aspect i.e. tendering and tracking and will provide efficient performance which will ease the management of various projects by vendor and admin.
  • 96. Page 64 REFERENCES  Advance .NET Technology- By Dreamtech Publications  Asp.Net 2.0 Black Book  Asp.Net: The Complete Reference By Matthew Macdonald Published By McGraw Hill Education (India) Private Limited  asp.net-tutorials.com.  Beginning Android Application Development By wei meng lee Published By Wiley India Pvt Ltd  http://www.mgvcl.com/  Programming Android By O’riley publication  Software Engineering - Roger S Pressman [5th edition]  The Complete Reference Asp.Net by Robert Standefer III for Asp.Net  www.conceptdraw.com  www.freepatentonline.com  www.google.co.in  www.Ipindiaonline.gov.in  www.samaysoftware.com  www.stackoverflow.com  www.tutorialspoint.com  www.w3schools.com/aspnet  www.wikipedia.com  www.yoututbe.com
  • 97. APPENDIX I PERIODIC PROGRESS REPORTS  First 4 PPRs By Achal Patel (110410107016)  Second 4 PPRs By Krunal Patel (1104010107004)  Third 4 PPRs By Devang Mistry (110410107063)